本帖最后由 宅男女神 于 2015-12-9 21:32 编辑 # I) V6 T3 y C) _" C4 t
华为学习 数通原理(IP_VPN、MPLS和MPLS_VPN)
# z/ b# h1 n5 g+ s2 ~
& [& n. G3 M2 v0 w& u1 VPN 简介 ...................................................................................................................................... 1-1
+ s; {9 Z) }, A( R5 G. d4 s+ B" k5 I1.1 VPN 概述 ...................................................................................................................................................... 1-2! u W4 U! k- ^6 n) J6 ?0 e3 b; e
1.1.1 VPN 的产生 ......................................................................................................................................... 1-2
6 x5 P4 y. M8 o1.1.2 VPN 的特征 ......................................................................................................................................... 1-3
0 Z2 R3 E; w7 O8 P& r4 E1.1.3 VPN 的优势 ......................................................................................................................................... 1-38 X5 n. x$ T+ \ s$ j
1.2 VPN 分类 ...................................................................................................................................................... 1-4
; t6 ], h C- t) k8 P1.2.1 按组网模型 ........................................................................................................................................ 1-4
, o+ U y- U7 k* ?7 K0 Q1 O6 `1.2.2 按业务用途 ........................................................................................................................................ 1-6
* w" Q9 x( _. p) I4 ]% m1.2.3 按实现层次 ........................................................................................................................................ 1-7" Y& e! ]5 h/ J6 Y% C) }9 `) Z! [. ]
1.2.4 按运营模式 ........................................................................................................................................ 1-8
" h: X9 @4 F8 ~; u, k1.3 VPN 基本原理 .............................................................................................................................................. 1-9
$ R- F( s- \# Z; |1.3.1 隧道技术 ............................................................................................................................................ 1-9
, z+ i$ y" n' P9 |7 e0 @# \- s1.3.2 VPN 体系结构 ................................................................................................................................... 1-10
$ |' | k; c( X$ C# ` `6 J5 a1.3.3 VPN 实现模式 ................................................................................................................................... 1-10% g4 s7 L0 D! h; a" i8 k
1.4 VPN 的实现 ................................................................................................................................................ 1-11
S1 r2 J& [4 Q/ V' |1 ^1.4.1 VPN 典型网络结构 ........................................................................................................................... 1-11) @& u( c% X! p5 D/ X
1.4.2 VPN 的实现要点 ............................................................................................................................... 1-11
3 [0 @4 Y H$ ?1.5 参考资料清单 ............................................................................................................................................ 1-13
9 T& I# }" K3 h1 Y! L7 h; t v' a* J7 `" a2 VPN 隧道 .................................................................................................................................... 2-14) @8 ^1 p! Q. _; n( j
2.1 概述 ............................................................................................................................................................ 2-150 G9 O- Y8 L$ l
2.1.1 基本概念 .......................................................................................................................................... 2-15
6 H+ d, P; [4 }0 i: C& W0 d2.1.2 隧道协议分类................................................................................................................................... 2-15
. {1 ^, ^; R1 c7 s0 i2.2 具体的隧道技术 ........................................................................................................................................ 2-16; a5 w% h K" T) k; i! n* o
2.3 隧道管理 .................................................................................................................................................... 2-18
6 h H/ K5 \3 l/ D0 N9 f% W2.3.1 隧道管理概述................................................................................................................................... 2-18
. {9 X$ _" G( f, J2.3.2 隧道策略 .......................................................................................................................................... 2-18
: z- X2 K/ R* n9 c' M3 {2.4 参考资料清单 ............................................................................................................................................ 2-19; p- `$ g: c2 `" N- C3 Z" E9 y
3 L2TP ............................................................................................................................................ 3-21
8 j) y4 J+ L/ J/ Y3.1 L2TP 协议概述 ........................................................................................................................................... 3-22
8 y3 F: _, I* Z J1 k5 b) w3.1.1 VPDN 简介 ........................................................................................................................................ 3-22
6 H/ ]+ r9 H2 m3.1.2 L2TP 协议背景 ................................................................................................................................. 3-23
% k3 A5 O9 k7 f2 Y* X/ g5 R3.1.3 L2TP 基本概念 ................................................................................................................................. 3-24. o. J" v) z" P$ D/ t, w$ M A- e
3.1.4 L2TP 协议特点 ................................................................................................................................. 3-26& m8 Q% k* m) U# K# N; u( r
3.2 L2TP 协议原理 ........................................................................................................................................... 3-26 @# V) K, }, O9 W9 R
3.2.1 L2TP 协议结构 ................................................................................................................................. 3-27" T m2 H, L( g" W7 x) M5 S
3.2.2 L2TP 报文头 ..................................................................................................................................... 3-270 G; @* j! u& ]
3.2.3 L2TP 数据报文结构 ......................................................................................................................... 3-28
' `( H3 K. U/ Y; S, t3.2.4 控制连接和会话连接的建立过程 ................................................................................................... 3-29/ b& W& {* C7 X# n% m; o/ x
3.2.5 隧道验证过程................................................................................................................................... 3-32/ ], X" S/ l- B6 t, v. ^. C" X
3.2.6 L2TP 隧道会话的建立过程 .............................................................................................................. 3-33
/ X$ \) V( Z( }$ S# M0 J0 D3.2.7 LNS 对用户的认证方式 ................................................................................................................... 3-35* S9 q0 ]. C" w2 B2 R, c
3.2.8 L2TP 隧道交换 ................................................................................................................................. 3-362 Z, S/ \! H3 F7 \% K6 B% U' @
3.3 L2TP 应用 ................................................................................................................................................... 3-37. F5 O" N3 `' Z
3.3.1 两种典型的L2TP 隧道模式 ............................................................................................................ 3-37
* _% e6 X; |1 O* c4 X# p3.3.2 采用L2TP 接入三层VPN ............................................................................................................... 3-39# F! W7 W: g/ N4 S- F% _
3.3.3 L2TP 与MP 配合使用 ...................................................................................................................... 3-39
9 T" h( S1 _* a0 j' r7 y2 R3.3.4 Multi-Hop L2TP ................................................................................................................................ 3-40& p' }" L+ q' D3 h5 ~' H# P
3.3.5 L2TP 复杂组网 ................................................................................................................................. 3-40% F- |: M1 g8 f' w
3.4 参考资料清单 ............................................................................................................................................ 3-40
/ R$ F N% G( X, d! x' V4 GRE ............................................................................................................................................. 4-42
3 I( \' t' D) k" V% b4.1 简介 ............................................................................................................................................................ 4-43
4 z7 {! [+ ]$ _9 G3 `+ @. f4.1.1 GRE 协议概述................................................................................................................................... 4-43& p6 |% [( K5 P$ ~1 ~7 S0 T
4.1.2 GRE 报文头 ...................................................................................................................................... 4-44# V2 \* \4 f8 n" c& }5 [
4.1.3 GRE 的特点 ...................................................................................................................................... 4-44
) Q y: f5 Y: X) }, L4 _7 r) K4.2 GRE 的实现 ................................................................................................................................................ 4-45+ l# ^7 h! ~. O& L6 T
4.2.1 隧道接口 .......................................................................................................................................... 4-45
1 c1 W9 P, G b" ?. [0 q, `8 A$ \4.2.2 报文在GRE 中的传输过程 ............................................................................................................. 4-45
9 G: O! Y* c; Y$ G4.2.3 封装 .................................................................................................................................................. 4-46
# z) }9 _% W" c( K( M' H* g4.2.4 解封装 .............................................................................................................................................. 4-463 ^9 Z0 @' A) I
4.3 GRE 的安全机制 ........................................................................................................................................ 4-467 g" R8 Y. \, z0 t* X: S
4.3.1 GRE 的弱安全机制 ........................................................................................................................... 4-47' A" N8 B5 {2 v
4.3.2 Keepalive 检测 .................................................................................................................................. 4-48" D7 a3 A6 E3 |- T
4.3.3 与IPSec 的配合 ............................................................................................................................... 4-48 i- y' Z( G, }( _% g( {8 ^
4.4 GRE 应用 .................................................................................................................................................... 4-48
7 u" t! a5 X5 R& G4.4.1 多协议的本地网可以通过单一协议的骨干网传输 ....................................................................... 4-49
6 [8 L# a, U7 ?. o: T4.4.2 扩大跳数受限的网络工作范围 ....................................................................................................... 4-49# ?: b0 K: B" \0 u
4.4.3 将不连续的子网连接起来,用于组建VPN .................................................................................. 4-50
" E) [1 s+ k; A4.4.4 CE 采用GRE 隧道接入MPLS VPN ............................................................................................... 4-517 s+ v, i+ _5 V
4.4.5 与IPSec 结合,保护组播数据 ....................................................................................................... 4
4 _0 P, |% S* ~
' O8 j. H# u4 _6 r6 ?2 B金币不够用?来这里看看吧~~10种方法轻松拿金币~~~& W5 P9 [9 z6 O8 W5 {; C
精品资料+免回复+免积分+批量下载--->请关注VIP专区 |