Skip to main content

2018 | OriginalPaper | Buchkapitel

Application of VPN Based on L2TP and User’s Access Rights in Campus Network

verfasst von : Shuying Liu, Tao Zeng, Yan Chao, Hao Wang

Erschienen in: Advances in Brain Inspired Cognitive Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

VPN is widely used in colleges and universities at present, having brought great convenience to teachers and students in their study and life. Due to the fact that the current VPN in colleges and universities has the same access rights to all users, as long as VPN users login successfully via VPN account, they can access the campus network. As a result, not only is the management of the VPN administrators troublesome, but also the security of the network environment in the school is not very good. In view of this problem, this paper proposes a method that people visit the campus network resources according to user’s access authority in which the distribution of access rights can be distributed according to user’s identity category or individual way, and gives the application in college campus network. Finally, the simulation results show that this system is feasible to guarantee the security of communication.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
6.
Zurück zum Zitat Sun, G.Y.: VPN simulation based on GRE and IPSec protocols. J. Shaanxi Univ. Technol. (Nat. Sci. Ed.) 34(1), 49–55 (2018) Sun, G.Y.: VPN simulation based on GRE and IPSec protocols. J. Shaanxi Univ. Technol. (Nat. Sci. Ed.) 34(1), 49–55 (2018)
8.
Zurück zum Zitat Li, C.: The implementation and performance analysis of Campus network IPSec VPN system. J. Panzhihua Univ. 34(2), 35–40 (2017) Li, C.: The implementation and performance analysis of Campus network IPSec VPN system. J. Panzhihua Univ. 34(2), 35–40 (2017)
9.
Zurück zum Zitat Zhang, Z.: Application of SSL VPN in campus network. J. Puer Univ. 31(3), 33–37 (2015) Zhang, Z.: Application of SSL VPN in campus network. J. Puer Univ. 31(3), 33–37 (2015)
10.
Zurück zum Zitat Qing, H.: A new method of VPN based on LSP technology. In: 2nd Joint International Mechanical, Electronic and Information Technology Conference, Chongqing, China (2017) Qing, H.: A new method of VPN based on LSP technology. In: 2nd Joint International Mechanical, Electronic and Information Technology Conference, Chongqing, China (2017)
11.
Zurück zum Zitat Lu, B.: Research on user identification algorithm based on massive multi-site VPN log. In: 17th IEEE International Conference on Communication Technology, Chengdu, Sichuan, China (2017) Lu, B.: Research on user identification algorithm based on massive multi-site VPN log. In: 17th IEEE International Conference on Communication Technology, Chengdu, Sichuan, China (2017)
12.
Zurück zum Zitat Chen, H.: Design and implementation of secure enterprise network based on DMVPN. In: International Conference on Business Management and Electronic Information, Guangzhou Guangdong, China (2011) Chen, H.: Design and implementation of secure enterprise network based on DMVPN. In: International Conference on Business Management and Electronic Information, Guangzhou Guangdong, China (2011)
13.
Zurück zum Zitat Gao, P., Ren, J.: Analysis and realization of Snort-based intrusion detection system. Comput. Appl. Softw. 23(8), 134–135+138 (2006) Gao, P., Ren, J.: Analysis and realization of Snort-based intrusion detection system. Comput. Appl. Softw. 23(8), 134–135+138 (2006)
14.
Zurück zum Zitat Zhao, H., Ren, J.: Cognitive computation of compressed sensing for watermark signal measurement. Cogn. Comput. 8(2), 246–260 (2016)MathSciNetCrossRef Zhao, H., Ren, J.: Cognitive computation of compressed sensing for watermark signal measurement. Cogn. Comput. 8(2), 246–260 (2016)MathSciNetCrossRef
15.
Zurück zum Zitat Zhou, Y.: Hierarchical visual perception and two-dimensional compressive sensing for effective content-based color image retrieval. Cogn. Comput. 8(5), 877–889 (2016)CrossRef Zhou, Y.: Hierarchical visual perception and two-dimensional compressive sensing for effective content-based color image retrieval. Cogn. Comput. 8(5), 877–889 (2016)CrossRef
Metadaten
Titel
Application of VPN Based on L2TP and User’s Access Rights in Campus Network
verfasst von
Shuying Liu
Tao Zeng
Yan Chao
Hao Wang
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00563-4_66

Premium Partner