本帖最后由 宅男女神 于 2015-12-9 21:32 编辑 ( _' ^. p; i5 ?3 `+ b/ ?/ u
华为学习 数通原理(IP_VPN、MPLS和MPLS_VPN)
H# N% i* h& A M+ U
/ [* `8 m. Q4 }: I1 VPN 简介 ...................................................................................................................................... 1-1- X9 v C( |; K- Y8 n
1.1 VPN 概述 ...................................................................................................................................................... 1-2
4 Y* B j% c8 u3 U* `1.1.1 VPN 的产生 ......................................................................................................................................... 1-2
. L4 X: ]; u) U9 u1.1.2 VPN 的特征 ......................................................................................................................................... 1-3& {5 t }9 e+ n- b6 z" x5 ~. T
1.1.3 VPN 的优势 ......................................................................................................................................... 1-3
+ V! w: [* f! |4 K; s1.2 VPN 分类 ...................................................................................................................................................... 1-4
6 _: {7 E- ?. W# L1 s& N1.2.1 按组网模型 ........................................................................................................................................ 1-4
) S! x& z1 @: I8 Q1.2.2 按业务用途 ........................................................................................................................................ 1-6
4 N* S/ B7 {! B! m- x1.2.3 按实现层次 ........................................................................................................................................ 1-7
- }, k$ W, l" W& ^1.2.4 按运营模式 ........................................................................................................................................ 1-8$ X% [4 j6 K3 z+ b- `) Q! Y3 m$ G
1.3 VPN 基本原理 .............................................................................................................................................. 1-97 B' |, I# M8 U; r" ?
1.3.1 隧道技术 ............................................................................................................................................ 1-9
% L4 D9 A3 B# r! ~1 [( J3 x1.3.2 VPN 体系结构 ................................................................................................................................... 1-10# S, `: K/ i6 k! u" o
1.3.3 VPN 实现模式 ................................................................................................................................... 1-10
3 k$ ~% H3 t g( D1.4 VPN 的实现 ................................................................................................................................................ 1-112 g: A2 ~, A7 O# p7 {6 R
1.4.1 VPN 典型网络结构 ........................................................................................................................... 1-11
6 i* q7 d& ]) j1.4.2 VPN 的实现要点 ............................................................................................................................... 1-11
; F1 J9 v( S8 I! I. H1.5 参考资料清单 ............................................................................................................................................ 1-13
3 b' f/ \, k- ~2 VPN 隧道 .................................................................................................................................... 2-144 @$ X* `0 F9 K5 o; ]) c7 x6 K0 O
2.1 概述 ............................................................................................................................................................ 2-156 r# C0 V5 s! i; @6 d+ a' R
2.1.1 基本概念 .......................................................................................................................................... 2-15) ^- C% A; H) }7 O9 l& d
2.1.2 隧道协议分类................................................................................................................................... 2-15: u; J" D0 S. \/ P z2 _. @
2.2 具体的隧道技术 ........................................................................................................................................ 2-169 Y5 k) o+ ~1 b6 M
2.3 隧道管理 .................................................................................................................................................... 2-18) z, ~& O2 V, x( s0 |9 G
2.3.1 隧道管理概述................................................................................................................................... 2-181 i( A- l# U# V% @1 c% H! a
2.3.2 隧道策略 .......................................................................................................................................... 2-181 |: j0 A0 g; L5 e7 P/ E( F! _
2.4 参考资料清单 ............................................................................................................................................ 2-19
0 t9 K! @; B7 V8 }2 G P3 n3 L2TP ............................................................................................................................................ 3-21
' Q7 |( C- e! f) R9 c3.1 L2TP 协议概述 ........................................................................................................................................... 3-22
9 x$ f% ^+ H: E# O8 s3.1.1 VPDN 简介 ........................................................................................................................................ 3-22$ A# I/ }9 N2 m
3.1.2 L2TP 协议背景 ................................................................................................................................. 3-23
9 n( n6 h6 {' a( l3.1.3 L2TP 基本概念 ................................................................................................................................. 3-24
( U7 h6 ~# x1 v/ Q5 J' ?3.1.4 L2TP 协议特点 ................................................................................................................................. 3-26
3 ~. k) M" C b3.2 L2TP 协议原理 ........................................................................................................................................... 3-26
+ p& x( e9 {9 k4 H, z2 O G9 o3.2.1 L2TP 协议结构 ................................................................................................................................. 3-274 W7 X! V" ?% {7 W4 c
3.2.2 L2TP 报文头 ..................................................................................................................................... 3-27
R% M6 p, s6 }7 r! a T3.2.3 L2TP 数据报文结构 ......................................................................................................................... 3-28
- C3 D, b& g m* T3.2.4 控制连接和会话连接的建立过程 ................................................................................................... 3-29
2 j! I* n7 U6 Q L# V3.2.5 隧道验证过程................................................................................................................................... 3-32" p2 m$ U$ R( Y" t0 X% }( t
3.2.6 L2TP 隧道会话的建立过程 .............................................................................................................. 3-331 R- v6 N$ B+ u0 C; n; u% d
3.2.7 LNS 对用户的认证方式 ................................................................................................................... 3-35
. S% q8 a2 b7 T0 S2 E7 P3.2.8 L2TP 隧道交换 ................................................................................................................................. 3-36. N( E- L2 u: c
3.3 L2TP 应用 ................................................................................................................................................... 3-37
. _, s* m- H* L" r6 F3 h3.3.1 两种典型的L2TP 隧道模式 ............................................................................................................ 3-37" r1 z7 o; X. D& E/ A
3.3.2 采用L2TP 接入三层VPN ............................................................................................................... 3-39; H% P O7 b; g2 N
3.3.3 L2TP 与MP 配合使用 ...................................................................................................................... 3-39/ u6 |$ r/ _5 V( R3 J
3.3.4 Multi-Hop L2TP ................................................................................................................................ 3-40
# J! b9 N: }+ b l% d7 ^( `. `! @3.3.5 L2TP 复杂组网 ................................................................................................................................. 3-40
3 j- L. E" k9 h c" t* y- H1 i$ ?. D3.4 参考资料清单 ............................................................................................................................................ 3-40
5 Y! G c. I4 Y4 GRE ............................................................................................................................................. 4-42) |: I5 J/ `) C9 |' h
4.1 简介 ............................................................................................................................................................ 4-43
' X( }9 S+ g2 Z7 k+ n$ i7 p4.1.1 GRE 协议概述................................................................................................................................... 4-43: K! Z. ?8 ~/ Y9 h. ^, I* I2 U
4.1.2 GRE 报文头 ...................................................................................................................................... 4-44, O8 L; {, t5 s S
4.1.3 GRE 的特点 ...................................................................................................................................... 4-44) B2 a6 r4 X$ F8 j/ |+ L. v+ g3 l
4.2 GRE 的实现 ................................................................................................................................................ 4-45. Q* \* N: D. o* }, d/ }$ c
4.2.1 隧道接口 .......................................................................................................................................... 4-45
% Z# O8 o) J2 b3 y) o$ t, c4.2.2 报文在GRE 中的传输过程 ............................................................................................................. 4-45
+ k5 v2 t. d( m6 f! }, [4.2.3 封装 .................................................................................................................................................. 4-46
: R+ _% T9 a. Q! B Q4.2.4 解封装 .............................................................................................................................................. 4-46; c& J" B% M3 k3 d2 \# U
4.3 GRE 的安全机制 ........................................................................................................................................ 4-46
E/ B# ?' d7 W' J! u. g4.3.1 GRE 的弱安全机制 ........................................................................................................................... 4-47
( L1 o% H- E* I3 s' K% A4.3.2 Keepalive 检测 .................................................................................................................................. 4-48. ~" A, a( c! m
4.3.3 与IPSec 的配合 ............................................................................................................................... 4-48
& _5 [# p8 u9 ], E& \3 |4.4 GRE 应用 .................................................................................................................................................... 4-48
( c% u' g5 i" H& `% h4.4.1 多协议的本地网可以通过单一协议的骨干网传输 ....................................................................... 4-49
3 }/ b0 h2 a1 C9 Z4.4.2 扩大跳数受限的网络工作范围 ....................................................................................................... 4-49
( G- a& w, o$ x8 E4.4.3 将不连续的子网连接起来,用于组建VPN .................................................................................. 4-50
& J, o: e5 ^$ G. P! W4 O' U( E' O9 [6 K4.4.4 CE 采用GRE 隧道接入MPLS VPN ............................................................................................... 4-51
; L X/ D7 w: D3 K4.4.5 与IPSec 结合,保护组播数据 ....................................................................................................... 4
3 T: w0 B( }% U/ P9 ]& y. C& E9 g; ?8 V4 r
金币不够用?来这里看看吧~~10种方法轻松拿金币~~~
7 X) u; Y0 i- ?精品资料+免回复+免积分+批量下载--->请关注VIP专区 |