当前位置:网站首页>Virtual private network foundation
Virtual private network foundation
2022-06-24 22:31:00 【Zhuge iron and steel cloud】
One 、vpn The concept of
×××(Virtual Private Network): Virtual private network , It provides us with a way to use the public network , It is a connection mode that can safely remotely access the private network inside the enterprise . We know that a network connection usually consists of three parts : The client 、 Transmission media and servers .××× It also consists of these three parts , The difference is ××× The connection uses the tunnel as the transmission channel , This tunnel is built on the basis of public network or private network
Two 、vpn The type of
××× It's a bit confusing . Different manufacturers are selling their ××× Products are classified in different ways , They are mainly divided from the perspective of products . Different ISP In the development of ××× Different classification methods have been introduced in business , They are mainly divided from the perspective of business development . Users often have their own division methods , Mainly according to their own needs .
1> By access mode
This is what users and operators are most concerned about ××× The divisions . In general , The user may be on a dedicated line ( Int ) Netted , It may also be dial-up , This will depend on the specific circumstances of support . Based on the IP Online ××× There are two corresponding access methods : Special line access mode and dial-up access mode .
(1) A dedicated line ×××: It is for those who have been connected through a dedicated line ISP Provided by the user of the edge router ××× Solution . This is a kind of “ Always online ” Of ×××, It can save the cost of the traditional long-distance special line .
(2) dial ×××( also called VPDN): It is used to dial PSTN or ISDN Access ISP Provided by the user ××× Business . This is a kind of “ Connect on demand ” Of ×××, It can save users' long-distance telephone charges . It's important to point out that , Because users are generally roaming users , yes “ Connected on demand , therefore VPDN Identity authentication is usually required ( Such as the use of CHAP and RADIUS)
2 > By protocol implementation type
This is a ××× Manufacturer and ISP The most concerned about the division . According to the hierarchical model ,××× It can be established on the second layer , It can also be established on the third layer ( Some people even classify some security protocols at higher levels as ××× agreement .)
(1) The second layer tunnel protocol : This includes point-to-point tunneling protocols (PPTP)、 Second layer Forwarding Protocol (L2F), The second layer tunnel protocol (L2TP)、 Multiprotocol label switching (MPLS) etc. .
(2) Layer 3 Tunneling Protocol : This includes the generic routing encapsulation protocol (GRE)、IP Security (IPSec), These are the two most popular three-layer protocols .
The difference between layer 2 and layer 3 tunneling protocols mainly lies in the layers of the network protocol stack where user data is encapsulated , among GRE、IPSec and MPLS It is mainly used to realize special line ××× Business ,L2TP It is mainly used for dialing ××× Business ( But it can also be used to realize dedicated lines ××× Business ), Of course, these agreements are not in conflict with each other , It can be used in combination .
notes :MPLS Some books classify it as the second layer , Some books are classified as the third layer , But strictly speaking, it should belong to 2.5 layer . Because it lies between the traditional layer 2 and layer 3 protocols , Its upper layer protocol and lower layer protocol can be various protocols in the current network . Such as :IPX,APPLETALK etc. .
3 > Press ××× Division of initiation methods of
This is the customer and IPS Most concerned about ××× classification .××× Business can be realized independently by customers , It can also be done by ISP Provided .
(1) launch ( Also called customer based ):××× The starting and ending points of service provision are customer-oriented , Its internal technical composition 、 Implementation and management of ××× Customers can see . Need client and tunnel server ( Or gateway ) We install the tunnel software . Client's software initiated tunnel , Terminate the tunnel at the company tunnel server . here ISP There is no need to do anything to support the establishment of the tunnel . After checking the user id (ID) And password verification , It is very easy for the client and the tunnel server to build a tunnel . Both parties can also communicate in an encrypted way . Once the tunnel is built , The user will feel ISP No longer involved in communication .
(2) The server initiates ( Also known as customer transparent or web-based ): In the Central Department of the company or ISP It's about (POP、Point of presence) install ××× Software , Customers do not need to install any special software . Mainly for ISP Provide comprehensive management ××× service , The starting and ending points of service provision are ISP Of POP, Its internal composition 、 Implementation and management of ××× The customer is completely transparent .
In the tunneling protocol described above , at present MPLS Can only be used for server initiated ××× The way .
4 > Press ××× Classification of service types
Depending on the type of service ,××× The business is roughly divided into three categories : Access ×××(Access ×××)、 Intranet ×××(Intranet ×××) And extranet ×××(Extranet ×××). Usually the intranet ××× It's a special line ×××.
(1) Access ×××: This is when employees or small branches of an enterprise remotely access the internal network of the enterprise through the public network ××× The way . The remote user is usually a computer , Not the Internet , Therefore, it is composed of ××× Is a host to network topology model . It should be pointed out that access ××× Different from the previous dialing ×××, This is a confusing place , Because remote access can be accessed in the form of dedicated lines , It can also be accessed by dialing .
(2) Intranet ×××: This is a virtual network built through the public network between the headquarters and branches of the enterprise , This is a network to network connection in a peer-to-peer manner ×××.
(3) extranets ×××: This is the acquisition of the enterprise 、 Merger or strategic alliance between enterprises , The virtual network built by different enterprises through the public network . This is a network to network connection in an unequal way ×××( It is mainly different in security policy ).
5 > Divided by bearing body
Operation ××× Business enterprise ; They can build their own ××× The Internet , You can also outsource this business to ××× merchant . This is the customer and ISP Most concerned issues .
(1) build by oneself ×××: This is a customer initiated ×××. Enterprises install at the site ××× Client software , Install at the edge of the enterprise network ××× gateway software , Completely independent of the operators to build their own ××× The Internet , Operators do not need to do anything right ××× Support for . Enterprises build themselves ××× The advantage is that it can directly control ××× The Internet , Independent of the operator , also ××× The access device is also independent . But the disadvantage is ××× The technology is very complex , Formed in this way ××× Cost is very high ,QoS It's hard to guarantee .
(2) outsource ×××: Enterprises put ××× Service outsourcing to operators , The operator plans according to the requirements of the enterprise 、 Design 、 Implement and operate the customer's ××× Business . Enterprises can reduce the cost of organization, operation and maintenance ××× The cost of , And operators can also open up new IP Business value-added services market , Get higher returns , And improve customer retention and loyalty . The author will outsource the current ××× There are two kinds of : Web based ××× And based on CE( User edge devices ) Management type ×××(Managed ×××). Web based ××× Usually at the presentation point of the operator network (POP) Install carrier class ××× Switching equipment . be based on CE Management type ××× Business is a trusted third party responsible for designing what the enterprise wants ××× Solution , And manage on behalf of the enterprise , The security gateway used ( A firewall 、 Router, etc ) On the user's side .
6 > Press ××× Business hierarchy model division
That's according to a ISP Provide users with ××× The service work is divided into several layers ( Note that it is not divided according to which layer the tunnel protocol works on ).
(1) dial ××× Business (VPDN): This is one of the first division methods VPDN( In fact, it is divided according to the access mode , Because it's hard to know VPDN Which floor does it belong to ).
(2) Virtual leased line (VLL): This is a simulation of the traditional leased line service , use IP The network simulates the leased line , From the perspective of users at both ends, such a virtual leased line is equivalent to the leased line in the past .
(3) Virtual private routing network (VPRN) Business : This is the third floor IP A simulation of a routing network . You can put VPRN Understand it as the third layer ××× technology .
(4) Virtual private LAN segment (VPLS): This is IP Wan emulation LAN Technology . You can put VPLS Understand it as a second layer ××× technology .


-----------------------------------
vpn Basic knowledge summary of
https://blog.51cto.com/gejielin/88639
边栏推荐
- TCP RTT measurement tips
- In the era of industrial Internet, there is no Internet in the traditional sense
- Idea close global search box
- EasyBypass
- How to grab the mobile phone bag for analysis? Fiddler artifact may help you!
- NIO多路复用之Selector的使用
- 磁盤的結構
- L2 元年,Arbitrum Nitro 升级带来更兼容高效的开发体验
- The ktp900f mobile download program of the fail safe mobile panel prompts that the download cannot be performed, and the target device is running or not in the transmission mode
- DP problem set
猜你喜欢

String exercise summary 2

Technology inventory: past, present and future of Message Oriented Middleware

Yida technology signed a contract with seven wolves to help the digital transformation of "Chinese men's wear leader"

重磅!法大大上榜“专精特新”企业

In the first year of L2, arbitrum nitro was upgraded to bring more compatible and efficient development experience

NiO zero copy

Technology Review: what is the evolution route of container technology? What imagination space is there in the future?

Introduction, installation and use of postman tool

How does flutter use the online transcoding tool to convert JSON to model

Cross border e-commerce, early entry and early benefit
随机推荐
Servlet详解
EasyBypass
如何比较两个或多个分布:从可视化到统计检验的方法总结
Docker 安装 MySQL 8.0,详细步骤
树莓派初步使用
Concurrency of heap memory allocation
Notes on writing questions (18) -- binary tree: common ancestor problem
leetcode:45. Jumping game II [classic greed]
Chapter 10 project stakeholder management
Industrial development status of virtual human
堆內存分配的並發問題
NIO、BIO、AIO
How to solve the problem that the computer suddenly can't connect to WiFi
leetcode:515. Find the maximum value in each tree row [brainless BFS]
The ktp900f mobile download program of the fail safe mobile panel prompts that the download cannot be performed, and the target device is running or not in the transmission mode
堆内存分配的并发问题
Huada 4a0gpio settings
Unable to use the bean introduced into the jar package
Learning notes 23-- basic theory of multi-sensor information fusion (Part I)
Idea global search replace shortcut key