Skip to main content
Top

2018 | OriginalPaper | Chapter

Application of VPN Based on L2TP and User’s Access Rights in Campus Network

Authors : Shuying Liu, Tao Zeng, Yan Chao, Hao Wang

Published in: Advances in Brain Inspired Cognitive Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

VPN is widely used in colleges and universities at present, having brought great convenience to teachers and students in their study and life. Due to the fact that the current VPN in colleges and universities has the same access rights to all users, as long as VPN users login successfully via VPN account, they can access the campus network. As a result, not only is the management of the VPN administrators troublesome, but also the security of the network environment in the school is not very good. In view of this problem, this paper proposes a method that people visit the campus network resources according to user’s access authority in which the distribution of access rights can be distributed according to user’s identity category or individual way, and gives the application in college campus network. Finally, the simulation results show that this system is feasible to guarantee the security of communication.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
6.
go back to reference Sun, G.Y.: VPN simulation based on GRE and IPSec protocols. J. Shaanxi Univ. Technol. (Nat. Sci. Ed.) 34(1), 49–55 (2018) Sun, G.Y.: VPN simulation based on GRE and IPSec protocols. J. Shaanxi Univ. Technol. (Nat. Sci. Ed.) 34(1), 49–55 (2018)
8.
go back to reference Li, C.: The implementation and performance analysis of Campus network IPSec VPN system. J. Panzhihua Univ. 34(2), 35–40 (2017) Li, C.: The implementation and performance analysis of Campus network IPSec VPN system. J. Panzhihua Univ. 34(2), 35–40 (2017)
9.
go back to reference Zhang, Z.: Application of SSL VPN in campus network. J. Puer Univ. 31(3), 33–37 (2015) Zhang, Z.: Application of SSL VPN in campus network. J. Puer Univ. 31(3), 33–37 (2015)
10.
go back to reference Qing, H.: A new method of VPN based on LSP technology. In: 2nd Joint International Mechanical, Electronic and Information Technology Conference, Chongqing, China (2017) Qing, H.: A new method of VPN based on LSP technology. In: 2nd Joint International Mechanical, Electronic and Information Technology Conference, Chongqing, China (2017)
11.
go back to reference Lu, B.: Research on user identification algorithm based on massive multi-site VPN log. In: 17th IEEE International Conference on Communication Technology, Chengdu, Sichuan, China (2017) Lu, B.: Research on user identification algorithm based on massive multi-site VPN log. In: 17th IEEE International Conference on Communication Technology, Chengdu, Sichuan, China (2017)
12.
go back to reference Chen, H.: Design and implementation of secure enterprise network based on DMVPN. In: International Conference on Business Management and Electronic Information, Guangzhou Guangdong, China (2011) Chen, H.: Design and implementation of secure enterprise network based on DMVPN. In: International Conference on Business Management and Electronic Information, Guangzhou Guangdong, China (2011)
13.
go back to reference Gao, P., Ren, J.: Analysis and realization of Snort-based intrusion detection system. Comput. Appl. Softw. 23(8), 134–135+138 (2006) Gao, P., Ren, J.: Analysis and realization of Snort-based intrusion detection system. Comput. Appl. Softw. 23(8), 134–135+138 (2006)
14.
go back to reference Zhao, H., Ren, J.: Cognitive computation of compressed sensing for watermark signal measurement. Cogn. Comput. 8(2), 246–260 (2016)MathSciNetCrossRef Zhao, H., Ren, J.: Cognitive computation of compressed sensing for watermark signal measurement. Cogn. Comput. 8(2), 246–260 (2016)MathSciNetCrossRef
15.
go back to reference Zhou, Y.: Hierarchical visual perception and two-dimensional compressive sensing for effective content-based color image retrieval. Cogn. Comput. 8(5), 877–889 (2016)CrossRef Zhou, Y.: Hierarchical visual perception and two-dimensional compressive sensing for effective content-based color image retrieval. Cogn. Comput. 8(5), 877–889 (2016)CrossRef
Metadata
Title
Application of VPN Based on L2TP and User’s Access Rights in Campus Network
Authors
Shuying Liu
Tao Zeng
Yan Chao
Hao Wang
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00563-4_66

Premium Partner