In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-22 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)05/31 Report--
Enterprise application of VPN technology example analysis, I believe that many inexperienced people do not know what to do, so this paper summarizes the causes of the problem and solutions, through this article I hope you can solve this problem.
VPN (Virtual Private Network)
Virtual private network (VPN), which encrypts data by establishing a private network on the public network, is more and more widely used in enterprises. There are many types of VPN, mainly to distinguish the types of VPN by protocol types, and it is also implemented in a variety of ways, such as servers, hardware and software.
At present, the most commonly used ones are: SSL-VPN, IPsec-VPN
The main features of SSL-VPN are as follows:
Adopt SSL protocol, between HTTP layer and TCP layer, use SSL protocol to encrypt and transmit data.
SSL-VP is connected to a certain application within the enterprise, but not the whole enterprise intranet, so it is more secure.
Internal network only needs to open port 443, session protection is powerful (automatically disconnected)
No need to change the policy of the internal firewall
IPSEC-VPN has the following characteristics:
The consumption of key negotiation between the two sides of the conversation is low.
Few programs need to be changed by the client
VPN network that is easy to build
Today, let's introduce how to configure IPSEC transport mode VPN on Windows systems.
Open Management tool-Local Security Settings-IP Security Policy
Right-click in the right margin to create a new policy
Enter a name and related description
Just pay attention to the mark above.
Next step-finish-check Edit Properties
Click add-next
Select the network type according to the demand. Next step.
Click add-enter Rule name-add-next
Select source address (you can also enter it manually) next
Enter the destination address (drop-down to choose from)
Protocol Typ
Select the port number (or any port)
Click finish
Check the next step of the new rule
Add using the wizard
Set the new rule name next
Select operation behavior
Check Edit Properties-finish
Custom settings-selection algorithm and encryption algorithm
Check the rule next step
Use pre-shared key for authentication (enter shared key) next step
A VPN policy is generated on the right side of the IP security policy.
Right-click the policy name-assign-complete the policy assignment
At this point, the whole configuration is over and over, and the system configuration of the opposite end user is the same as that mentioned above. After the configuration of both ends is completed, the data can be encrypted and transmitted by IPSEC-VPN through the pre-shared key.
After reading the above, have you mastered the method of case analysis of enterprise application VPN technology? If you want to learn more skills or want to know more about it, you are welcome to follow the industry information channel, thank you for reading!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.