当前位置:网站首页>Virtual private network foundation
Virtual private network foundation
2022-06-24 22:31:00 【Zhuge iron and steel cloud】
One 、vpn The concept of
×××(Virtual Private Network): Virtual private network , It provides us with a way to use the public network , It is a connection mode that can safely remotely access the private network inside the enterprise . We know that a network connection usually consists of three parts : The client 、 Transmission media and servers .××× It also consists of these three parts , The difference is ××× The connection uses the tunnel as the transmission channel , This tunnel is built on the basis of public network or private network
Two 、vpn The type of
××× It's a bit confusing . Different manufacturers are selling their ××× Products are classified in different ways , They are mainly divided from the perspective of products . Different ISP In the development of ××× Different classification methods have been introduced in business , They are mainly divided from the perspective of business development . Users often have their own division methods , Mainly according to their own needs .
1> By access mode
This is what users and operators are most concerned about ××× The divisions . In general , The user may be on a dedicated line ( Int ) Netted , It may also be dial-up , This will depend on the specific circumstances of support . Based on the IP Online ××× There are two corresponding access methods : Special line access mode and dial-up access mode .
(1) A dedicated line ×××: It is for those who have been connected through a dedicated line ISP Provided by the user of the edge router ××× Solution . This is a kind of “ Always online ” Of ×××, It can save the cost of the traditional long-distance special line .
(2) dial ×××( also called VPDN): It is used to dial PSTN or ISDN Access ISP Provided by the user ××× Business . This is a kind of “ Connect on demand ” Of ×××, It can save users' long-distance telephone charges . It's important to point out that , Because users are generally roaming users , yes “ Connected on demand , therefore VPDN Identity authentication is usually required ( Such as the use of CHAP and RADIUS)
2 > By protocol implementation type
This is a ××× Manufacturer and ISP The most concerned about the division . According to the hierarchical model ,××× It can be established on the second layer , It can also be established on the third layer ( Some people even classify some security protocols at higher levels as ××× agreement .)
(1) The second layer tunnel protocol : This includes point-to-point tunneling protocols (PPTP)、 Second layer Forwarding Protocol (L2F), The second layer tunnel protocol (L2TP)、 Multiprotocol label switching (MPLS) etc. .
(2) Layer 3 Tunneling Protocol : This includes the generic routing encapsulation protocol (GRE)、IP Security (IPSec), These are the two most popular three-layer protocols .
The difference between layer 2 and layer 3 tunneling protocols mainly lies in the layers of the network protocol stack where user data is encapsulated , among GRE、IPSec and MPLS It is mainly used to realize special line ××× Business ,L2TP It is mainly used for dialing ××× Business ( But it can also be used to realize dedicated lines ××× Business ), Of course, these agreements are not in conflict with each other , It can be used in combination .
notes :MPLS Some books classify it as the second layer , Some books are classified as the third layer , But strictly speaking, it should belong to 2.5 layer . Because it lies between the traditional layer 2 and layer 3 protocols , Its upper layer protocol and lower layer protocol can be various protocols in the current network . Such as :IPX,APPLETALK etc. .
3 > Press ××× Division of initiation methods of
This is the customer and IPS Most concerned about ××× classification .××× Business can be realized independently by customers , It can also be done by ISP Provided .
(1) launch ( Also called customer based ):××× The starting and ending points of service provision are customer-oriented , Its internal technical composition 、 Implementation and management of ××× Customers can see . Need client and tunnel server ( Or gateway ) We install the tunnel software . Client's software initiated tunnel , Terminate the tunnel at the company tunnel server . here ISP There is no need to do anything to support the establishment of the tunnel . After checking the user id (ID) And password verification , It is very easy for the client and the tunnel server to build a tunnel . Both parties can also communicate in an encrypted way . Once the tunnel is built , The user will feel ISP No longer involved in communication .
(2) The server initiates ( Also known as customer transparent or web-based ): In the Central Department of the company or ISP It's about (POP、Point of presence) install ××× Software , Customers do not need to install any special software . Mainly for ISP Provide comprehensive management ××× service , The starting and ending points of service provision are ISP Of POP, Its internal composition 、 Implementation and management of ××× The customer is completely transparent .
In the tunneling protocol described above , at present MPLS Can only be used for server initiated ××× The way .
4 > Press ××× Classification of service types
Depending on the type of service ,××× The business is roughly divided into three categories : Access ×××(Access ×××)、 Intranet ×××(Intranet ×××) And extranet ×××(Extranet ×××). Usually the intranet ××× It's a special line ×××.
(1) Access ×××: This is when employees or small branches of an enterprise remotely access the internal network of the enterprise through the public network ××× The way . The remote user is usually a computer , Not the Internet , Therefore, it is composed of ××× Is a host to network topology model . It should be pointed out that access ××× Different from the previous dialing ×××, This is a confusing place , Because remote access can be accessed in the form of dedicated lines , It can also be accessed by dialing .
(2) Intranet ×××: This is a virtual network built through the public network between the headquarters and branches of the enterprise , This is a network to network connection in a peer-to-peer manner ×××.
(3) extranets ×××: This is the acquisition of the enterprise 、 Merger or strategic alliance between enterprises , The virtual network built by different enterprises through the public network . This is a network to network connection in an unequal way ×××( It is mainly different in security policy ).
5 > Divided by bearing body
Operation ××× Business enterprise ; They can build their own ××× The Internet , You can also outsource this business to ××× merchant . This is the customer and ISP Most concerned issues .
(1) build by oneself ×××: This is a customer initiated ×××. Enterprises install at the site ××× Client software , Install at the edge of the enterprise network ××× gateway software , Completely independent of the operators to build their own ××× The Internet , Operators do not need to do anything right ××× Support for . Enterprises build themselves ××× The advantage is that it can directly control ××× The Internet , Independent of the operator , also ××× The access device is also independent . But the disadvantage is ××× The technology is very complex , Formed in this way ××× Cost is very high ,QoS It's hard to guarantee .
(2) outsource ×××: Enterprises put ××× Service outsourcing to operators , The operator plans according to the requirements of the enterprise 、 Design 、 Implement and operate the customer's ××× Business . Enterprises can reduce the cost of organization, operation and maintenance ××× The cost of , And operators can also open up new IP Business value-added services market , Get higher returns , And improve customer retention and loyalty . The author will outsource the current ××× There are two kinds of : Web based ××× And based on CE( User edge devices ) Management type ×××(Managed ×××). Web based ××× Usually at the presentation point of the operator network (POP) Install carrier class ××× Switching equipment . be based on CE Management type ××× Business is a trusted third party responsible for designing what the enterprise wants ××× Solution , And manage on behalf of the enterprise , The security gateway used ( A firewall 、 Router, etc ) On the user's side .
6 > Press ××× Business hierarchy model division
That's according to a ISP Provide users with ××× The service work is divided into several layers ( Note that it is not divided according to which layer the tunnel protocol works on ).
(1) dial ××× Business (VPDN): This is one of the first division methods VPDN( In fact, it is divided according to the access mode , Because it's hard to know VPDN Which floor does it belong to ).
(2) Virtual leased line (VLL): This is a simulation of the traditional leased line service , use IP The network simulates the leased line , From the perspective of users at both ends, such a virtual leased line is equivalent to the leased line in the past .
(3) Virtual private routing network (VPRN) Business : This is the third floor IP A simulation of a routing network . You can put VPRN Understand it as the third layer ××× technology .
(4) Virtual private LAN segment (VPLS): This is IP Wan emulation LAN Technology . You can put VPLS Understand it as a second layer ××× technology .
-----------------------------------
vpn Basic knowledge summary of
https://blog.51cto.com/gejielin/88639
边栏推荐
- Can AI chat robots replace manual customer service?
- The logic of "Ali health" has long changed
- 波卡生态发展不设限的奥义——多维解读平行链
- NiO, bio, AIO
- In the era of full programming, should I give up this road?
- String exercise summary 2
- Balanced binary search tree
- Use of selector for NiO multiplexing
- 华大04a工作模式/低功耗模式
- Resolving the conflict problem of the flutter Library
猜你喜欢
EasyBypass
leetcode:45. Jumping game II [classic greed]
ansible基本配置
60 个神级 VS Code 插件!!
leetcode:515. 在每个树行中找最大值【无脑bfs】
如何抓手机的包进行分析,Fiddler神器或许能帮到您!
YGG recent game partners list
Chapter 10 project stakeholder management
Description of transparent transmission function before master and slave of kt6368a Bluetooth chip, 2.4G frequency hopping automatic connection
树莓派初步使用
随机推荐
ThreadLocal内存泄漏问题
img2pdf
KT6368A蓝牙芯片的主从机之前透传功能说明,2.4G跳频自动连接
故障安全移动面板KTP900F Mobile下载程序提示无法下载,目标设备正在运行或未处于传输模式的解决办法
揭秘B站,程序员穿女装敲代码,效率更高是真的吗?
嵌入式开发:技巧和窍门——干净地从引导加载程序跳转到应用程序代码
Disk structure
In the multi network card environment, the service IP registered by Nacos is incorrect, resulting in inaccessible services
Servlet详解
What aspects should we start with in the feasibility analysis of dry goods?
Redis hop table
Valueerror: cannot take a larger sample than population when 'replace=false‘
In the era of industrial Internet, there is no Internet in the traditional sense
socket(1)
Future development of education industry of e-commerce Express
Visitor tweets tell you which groups are consuming blind boxes
Resolving the conflict problem of the flutter Library
KT6368A蓝牙双模透传芯片软件版本选型说明
You are using pip version 21.1.2; however, version 22.1.2 is available
干货丨产品的可行性分析要从哪几个方面入手?