Abstract
The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. If a secure connection is necessary then a virtual private network (VPN) is essential. IPSec use encrypting and encapsulating technology in client device and establishes a secure tunnel connection. The private network built by IPSec technology can ensure good transmission performance and service quality over public networks. This paper analyses the architecture of IPSec and describes the process of creating a site-to-site IPSec VPN between header and branch of enterprise over internet. In addition, this study analyses the encryption at the boundary of the network and concludes a propose some practical problems need to consider inside enterprise network.
Publisher
Trans Tech Publications, Ltd.
Reference16 articles.
1. Aboba, B., & Dixon, W. (2004). IPsec-network address translation (NAT) compatibility requirements, RFC3715.
2. Doraswamy, N., & Harkins D. (2003). IPsec: the new security standard for the internet, intranets, and virtual private networks. London: Prentice-Hall.
3. Sebastian Marius Rosu, Marius Marian Popescu the virtual enterprise network based on IPSec VPN Solutions and Management. (LJACSA) International Journal of Advanced Computer Science and Applications. Vol 3, No. 11, (2012).
4. W. Stallings, Cryptography and network security: Principles and Practics. Prentice Hall, (1998).
5. T. Huang, G.Q. Wu and J. Wei, Runtime monitoring composite Web services through state full aspect extension, Journal of Computer Science and Technology, vol. 24(2), pp.294-308, (2009).