透過您的圖書館登入
IP:3.145.151.141
  • 學位論文

IPsec效能分析及IPsec VPN架構設計之研究

IPsec Performance and IPsec VPN Architecture study

指導教授 : 李鴻璋

摘要


目前較熱門的虛擬私有網路技術有IPsec和SSL虛擬私有網路,雖然IPsec在IPv4網路環境與NAT有建置上的複雜度,但在未來的五年,隨著IPv4的位址用盡和IPsec已成為IPv6協定標準的一部分,使得IPsec在IPv6網路環境上的建置更顯的重要和簡單,所以本論文探討IPsec虛擬私有網路在不同網路環境下的策略研究,以顯示出在IPv6網路環境下的不同網路架構建置IPsec都簡單而且大同小異,不需繁雜的設定步驟。本研究實驗IPsec在IPv6網路環境上使用不同整數運算能力主機時TCP和UDP傳輸資料的輸出量(throughput),以探討使用不同整數運算能力主機對於IPsec套用認證標頭和加密安全承載資料時效能的差異性。 本論文實驗結果顯示出,在TCP協定上使用IPsec的輸出量為未使用IPsec時的77.04%(較高運算能力主機)和75.46%(較低運算能力主機),而ARIGA只有未使用IPsec時的四分之ㄧ。同樣的,在UDP協定上,未使用IPsec的輸出量分別為80.31%和75.36%,ARIGA為未使用IPsec的九分之ㄧ。本文效能實驗結果希望能夠泯除在IPv6上使用IPsec導致效能嚴重下降的疑慮。

並列摘要


IPsec VPN and SSL VPN are getting popular nowadays. It is complex when IPsec is established with NAT in the IPv4 network. Future five years, when the IPv4 address is used finished and IPsec have now become a part of IPv6 standard, the establishment which IPsec is in the IPv6 network will be more important and easier. This research is about the policy setting which IPsec VPN is in the different network architecture. There are similar settings even if the network architecture is different. This research also do some experiment to gain the throughput of TCP/UDP data transmission by using different ability host and IPsec is implemented in the IPv6 network. We also research the different of throughput which different host uses the authentication header (AH) and encapsulating security payload (ESP). With both the AH and the ESP by using TCP, the throughput degrades to about 77.04% (higher ability host) and 75.46% (lower ability host), but ARIGA’s result shows that the throughput degrades to 1/4. When it is by using UDP, the throughput degrades to about 80.31% and 75.36%, but ARIGA’s result shows that the throughput degrades to 1/9. We hope this research can reduce the misgivings which the throughput dropped seriously when IPsec is used in the IPv6 network.

並列關鍵字

IPsec AH ESP VPN IPv6

參考文獻


[2] B.Carpenter and K.Moore, ” Connection of IPv6 Domains via IPv4 Clouds”, RFC3056, 2001
[4] Internet Engineering Task Force: http://www.ietf.org/
[10] W.Stallings , “Network Security Essentials : Applications and Standards”, Second Edition, Prentice Hall, 2002
[14] S.Deering and R.Hinden, “Internet Protocol, Version 6 Specifications”, RFC 2460 , 1998
[17] S.Kent and R.Atkinson, “Security Architecture for the Internet Protocol”, RFC 2401, 1998

延伸閱讀