期刊文献+

扩展OSPF协议实现VPN拓扑自动发现的方法

A Method of Implementing VPN Topology Automatic Discovery by Extensing OSPF Protocol
在线阅读 下载PDF
导出
摘要 随着IP数据通信技术的不断发展和新技术的涌现,许多设备制造商提出基于运营商网络的VPN解决方案,然而这种解决方案却增加了网络管理的复杂性,它使得运营商的PE设备需要了解其支持的每个VPN的全部路由信息,因此一个可运营的VPN解决方案必须引入VPN成员站点自动发现的机制。本文提供了一种通过扩展OSPF协议来传递网络中的VPN信息并完成拓扑学习的方法和实现。通过本文提供的方法,不仅可以快速、准确的完成VPN的拓扑学习,还可以快速、准确的获得VPN拓扑结构的动态变化。 Along with the IP data communication technology unceasing development and new technical emerging, many equipment manufacturers propose the VPN solution based on the operation business network. However this kind of solution actually increased the network management complexity, it causes the PE equipment of the operation business needs to understand its support each VPN complete route information, therefore the operation VPN solution have to introduce the VPN member automatic discovery mechanism. This article provided the method and the realization, through to expand the OSPF protocol to transport the VPN information in the network and complete the topology study. Through the method provided in this article, not only can complete the topology discovery fast, accurately, but also may obtains new VPN information and deletes old information, namely supports the VPN topology' s dynamic change.
作者 文春 黄迪明
出处 《微计算机信息》 北大核心 2006年第08X期166-168,共3页 Control & Automation
基金 四川省科技厅攻关基金(03GG006-021)
关键词 拓扑自动发现 VPN SSPF LSA 不透明LSA Topology Automatic Discovery, VPN, OSPF, LSA, Opacity LSA
  • 相关文献

参考文献3

  • 1J.Moy. RFC2328-OSPF Version 2. April 1998
  • 2钟廷龙,李鑫,郭云飞.OSPF路由协议安全性分析[J].微计算机信息,2005,21(08X):15-17. 被引量:9
  • 3D.Katz, K.Kompella, D.Yeung. RFC3630-Traffic Engineering Extensions to OSPF Version 2. September 2003.

二级参考文献4

  • 1J. Moy, "OSPF version 2," Standards Track RFC 2328[S], IETF, 1998.
  • 2Emanuele Jones, OSPF Security Vulnerabilities Analysis[Z]. Internet draft,draft-ietf-rpsee-ospf-vuln-00.txt, IETF, 2004.
  • 3A. Barbir, Generic Threats to Routing Protocols[Z], Internet draft,draft-ieff-rpsec-routing-threats-07, IETF, 2004.
  • 4NIST Brief Comments on Recent Cryptanalytic Attacks on Secure Hashing Functions and the Continued Security Provided by SHA-1, <http://csrc.nist.gov/hash_standards_comments.pdf>.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部