0% found this document useful (0 votes)
22 views13 pages

An Overview of Virtual Private Network V

The document appears to be a technical paper discussing Virtual Private Networks (VPNs). It includes multiple affiliations and contact information for the authors. The abstract and introduction sections suggest a focus on the functionality and applications of VPN technology.

Uploaded by

ahgj18
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views13 pages

An Overview of Virtual Private Network V

The document appears to be a technical paper discussing Virtual Private Networks (VPNs). It includes multiple affiliations and contact information for the authors. The abstract and introduction sections suggest a focus on the functionality and applications of VPN technology.

Uploaded by

ahgj18
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

       

#       ! "#   $   !

 %& & # '   &    (')


* '  %+ '

,  - ,-
San Diego Research Center, 2831 Camino del Rio South 301, San Diego, CA 92108
E-mail: [email protected]

./0 ,-
Microsoft ResearchÐAsia (MSRA), 5/F, Sigma Center, No. 49, Zhichun Road, Haidian District, Beijing, 100080, China
E-mail: [email protected], [email protected]

1  
Department of Computer Science, Hong Kong Baptist University, Kowloon, Hong Kong, China
E-mail: [email protected]

2 3
Department of Computer Science, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong, China
E-mail: [email protected]

4  &  5 6 4 &    +  +  

Abstract. 4  7    +  & +    +7  # &  + &    (')  & ! $   &    #
*/   '  + ' (%') + +          7 -  #    7 ##  7+  #
'! $ + + #  ++   +    +  & & & #  '            - # *
'  %'! 8 9  +    9 #  ' - :/          + &  + & + & 
             +        7  ' 7  '  7  '     ## 
' +    *;  <4:  "3;! 8   &      %' 7 ##         7
=   # %'  & + &    ! >7     &  %'     ++        --
 #   %'!

Keywords: *   '   &     (') +    

1 Introduction    - + ( B<)  -  #   


   #   ! "+   #  + &
4  7 &  + &     (') &    7  #  &  + 
    -    #   #  7 #        #  +  # 
 -?  -  @+      - + &    ! $ -   #  '
+       ! '  7     - +-7  &7 /
#    +        7  7       =&   +  # 
 +7   # 7 -    +7  #  &  + &    - + &
   ! $        &  #  # ! ' ++      ##   
 9 '    &   7  7 #         6 3//
      +  *  ! 3 (      )     - 
8 @7   'A $  7  9        *  ! 3 7
  '! <  7 +  -    ' #   ?      -   -9
          #     #     - CC7+ DD  
 Z. Zhang et al./An Overview of Virtual Private Network (VPN)

'! * 7 ' + & K  #  7 ##  7+  # '! *  +  #7
   +  &-  &  ##  ' 7+    ++  +   
  #  #  /     -! +  & & & # */   ' 
' +     &-  &  / %'!
& ++  L &-   7 $  #  ++   -?   # ! *
      K  ##  ;   +    - 9 # 
#  #  &-! ;     ' -  =+  ( :)/  
+     # 7 () 7 -     /     + &  + & + /
  # @+ & -/     6 () 7 &          
  -    # -/   +     +        7  '
 -  #   6 () + +    7  '  7  '! I##  '
  7  ' 7     - +    *;  -   - +
#M- #  +  ++    6  () (<4:)  "3;   M7    !   #
#    '  ?  *    &     + ##  7+  # * ' 
         (8) @+ + &   ;   ! * ;     
+    7 +7 ++-   - - +7  %'   M7 &  8 +   
       7 &  ! N &  ' #      7 =   #
=  / +  - # +     %'  & + &      
  7    + +  +7   + /    7 ##     ! * ; 
! $ & 7  + #  #      &  %'    
 -?D  /  ' (&  *    ++        --    
+  )  +   #   - 7  #   #   %'! ;      ++ !
 !  7 '  -  #  ## 
&   7   +   -   
  ! '    
+    *  @- (CC -7DD) 2 Overview of VPN
      -7!
$   &   & -  # *  2.1 Reference Model
+    - ( + 7   &  -  -   ' #        >-! !
& + @- (I8I")    )    :    -  &   
   #  +7  # * '  &  7     + &    #   
   - +     - ! :   + & -  &    &
("3;)/    *   +    7 + &    ! $ :  & + &   '
(*; )/   &    # +  &     ! $    + &  &
&  + &     (%')! * %'    & + &    !    &  
     #  &  7 #         :  &  7! * -   : 
        &  - G :  &  7       -
+   + ! $ +      (3;4)  *   !  7   # '
   -    + &-  
%'  !  %'  & -&   
+ &   + #   +  
-  + 7    -  
 + & +        #
-  +7    #   !
:   7         -   %'
+ &   &    #  & + & !
$  7    * '    #
7    %'   7! '  7+  # *
'  %'  + +      
  - 7 -  #    7 Fig. 1. ' #   !
Z. Zhang et al./An Overview of Virtual Private Network (VPN) 

' ++       !      


#9  +  7 &    ## 
 -  ! $  +  & +  
 #  '!
<  7 +  - '  
+   =+  ( :G :)/    + &
- (:)/   OP! *     :/
  '   #       /   '!
*  ++       :/   
   /   '  -  7! $   :/
  ' #    ++    (- -
-   7 )   - #  
        -  & ! * :/
  '       ++   7
      +   :  & ! $
  7   # &  + 
   #9 & * (  "3; <4: *;  */
/*  7   - +  (3$)  )! 
:/   '   + &  
+ & + &   7   +   :/
/:  -  = !
*  customer provisioned CE-based VPN 
 & + &   &   @  # 
    ! $ + & 7 ## - 
+ *  & ! >  + &  :/  
Fig. 2.  7  +   #       
 +- + !
' + &-  -   #    
+        ! $7+7
 7   #  9-  # 
+ &      #      ! *       + 
 +    #9 #  -&  ' #   # # +  #  - + ()   :
 '  #   #9 #  +      & !
    #   ! $   # ' N &        -  
  :  &      7 =   #     provider provisioned
    7  7   7 ! :@+  CE-based VPNs    #   & + &
# 7     +   & (;)      # --  + &-
+ @- ($I") +! :@+  # 7   :  & ! > + & + &  :/  
   7   +    ' + &-  -   #    
($") "3;  #  7! $   7+  +   ;! *    + & 7 
  :  : 7 ##  #   9- - +    :  & ! $
  7+    :  :    +   -   + &     + 7
:  !     #     + 7 
* >-!   +   7    #    #  ;!
      ##  +     + / > :/   ' (     + &
& 7 ! > @+  %'      + & ) -       & 
+7 7 !     + +  +     
    3! >-!     -  
:/2  '    ! $ '   
2.2 VPN Classi®cation *;  "3; !
$   &  7 7+  # +  '! *  A PE-based or network-based VPN    
  -&   #   + #  #  :  &    ;    + &  - 
Q Z. Zhang et al./An Overview of Virtual Private Network (VPN)

Fig. 3. :/   ' - *;   -  -7! Fig. 4. 4 #    # 7     /   '!

' OP!     /   '   + & @+ !  #    #  7     /


+ &  '  -  7  ;  7    :/   '  +     >-!  # 
:! $    @  #  '     OP!
#   :  &    +   # +  #  $  & =      #
      ! * :     /       ++    + 9   4 #! OP 
'       ++   7    ++    + & #    /  
    +   :  & ! $   7 ' 7 ; - *  -7 &   7-
  # &  +     #9 & "3;/   #   !  ##  9
 ;    (  "3; <4: *;   *// # '       ' 
*  )!  7   &    $"           OP!
#  7   @+ !
    /   '  #  -  2.2.1 Connection-Oriented VPNs
 7 N N ˆ ; ; † ' OP! ;+ 97   /    '    7 
   /   Layer 1 VPN   '   ' 7   7  #   ! '  -
 & +    7   + &  +   /    +//+ & 7  
$I"        &  #  7  $" &    
--   ' ! !    +    @+  # 7   /    '!
  &   +     '  -  #  +    #  
 & !     /   + '   7  ?- *;  (   7+ # + &7)  <4:
'    +       @+  # 7   /    '!
  &     # + &-  '   '        /
# ! "    %'  + &       '  + &   +  7  
 # -  !     /   Layer 2 VPN   #      &
  '   '  & +    7     +      @   &   
 + &      &     & + &       +7  
 &  --   ' OQP !-! - + &    !
*::: R >4  $" + !     /  
Layer 3 VPN   '   '  & 2.2.2 Connectionless VPN
+    7   + &   7   &    '   =  +  9 
    &  --   ' -  &    + &     
!-! - * + !     /   * '  +           
 7  '    *  - * +! 37     ' #  
#  -  -   * +  #  #  + //+  ! *  + //+
     *  -7    #     - #   @- 
+ &-  ' # ! 37  "3; (2<G    :    & + & D  
"3; ') &   ' OP   OP!
Z. Zhang et al./An Overview of Virtual Private Network (VPN) 

Fig. 5. N   '!

2.2.3 Hierarchical VPNs (VPNs within VPNs)  7      ! : 7+   + 7
*      & + & ## - '  &     #   -   + !
 &  7 7   #   -  &
+ & ! ;   & + &    7
&     - '  +  2.3.1 Point-to-Point Tunneling Protocol (PPTP)
'  ! >   # +7   $   +  + 9  & +  7 
 & + &    7    3 & / $ #  (+GG++ !!G# GG
'! ; 7  '    & + &  G-  G+++G+++!)! $ #   #
   7    3 & / '!     # -  -?   
#     '     >-! ! ( 3  $ - ) " #  + 
 G  7   : * $    B!;!
4 ! $ $ +    -   + # 
2.3 VPN Protocols  # -   = 7   #   & 6
'  -7       -   -7! + & /  -  6    
$ - &&  +- +     + -- 6 #7 $  &  -
   +  #     + ! 6     &    M  
*   # '  &  *   +      6 #7 $  &    
 #  &  ' +  #   +  ! $D +  7  -    7  ++ 
 * + ! /* + ! $ +  7    # $ 
; &     +  &  ++   #    -   #  7+
  # '  & +  $6 3$6 <4:   ! $  +    #7
*; 6 ;% ;! $  +  +?  / +7   $ + 9 7 7
   7+  '!     +     #  7  7+ 
'     &    7     ## 7 # @+ !
R Z. Zhang et al./An Overview of Virtual Private Network (VPN)

2.3.2 Layer Two Tunneling Protocol (L2TP) &-  &   +   !
$  - +   $  '  >-   -  &  ;% ;  
 37  >  - (3>)L +  + /      '  #9   
   +  7   + ! $ 3$   ++! $  ;% ;  &    
*   - -  #  (*:$>)     9- ;% ; + @7  &     
     #   #   @-  - &      ;% ; #   
+  D 3>  $! 3$       & !
@    +//+ +  ()
   +  +  # '! 3$ 2.3.6 Multiple Label Switching (MPLS)
@     7 (7  )   %;* "3;  +    #9  + &  + &7 
 L   - #   !    # 7   -   7+! $
3 $ 3$ ++  /*  ! *    -9 + @7  -  + &/
#   9   7+  ! N &  3$ - +  ! "3; &    7
++  /*     ' - #  +       #  7  $" 7
7 $"  ;%:$!  - ;  + & + ' # +
      #   # 7
2.3.3 Generic Routing Encapsulation &   ! $ "3;   =   :
<4:         +//+ *     7 @- - #  
 !    #   <4:    + & D -    ++   @--
     '! N &    #   - #     :   -
  7     #  7+   <4:    ' OP!
   +     7 &! <4:
    # # - '    & 2.3.7 VPN Products
+ & D + & *      ! $ 7   ; ' +       &   
 # #  - /* 7   #9    #  '  &   ## & 7   
+ & *    OP!  -   7+ #7! % 7+  #
' +   #  + - ! ' # 
2.3.4 Internet Protocol Security (IPSec)   + #   + - 7   
*;    -7    -7     = -9 ? #   /
  #  7+    - &  ! "7 &   +   
   +   +  +7   7  & /      / # 
 &   *    ! *      +   -  #       !
' +        +7   $   +        '
 7+    3$  $! *;  @   *     #9 -   
     7 (7  )  %;*! " *;  #  &  *    &  7 + 
     +      :  + #  #   '! 8  -   /
 & + &    7 + & -   /   '   +   -7
*;  '  & ! *;  @    *         -/=7  &
 &  #  + + # ++ -    + & !
*  /    &  -     
'! *;  + 97 +   - CC   2.4 Comparisons Among Different IP VPNs
  DD 7 - *      + - ##  '  -   # -
  ++     OP! #    !
Scalability: *       + &/
2.3.5 SOCKS Network Security Protocol - # '  &  #  /   /? 
$ ;% ; 7  + &   =  &      -  +   !
 +  # '! ;% ; #   Security: % # +      ' 
  7 (7 9& )  %;*      #   7       ## ##   &  #
  ' +     7        -  -  7+  #9
 ! $ +   ##  &-    +        !
Z. Zhang et al./An Overview of Virtual Private Network (VPN) J

Ease of VPN Creation: -     @- %'  & + &       
'     @    7    +   +7      
& &   -    M /   -  +    ! $  &
 - 7   = 7     &    7 &  &     #9! B- %'
#    7  -  /#/ & (<%;) +     +  +    +7
 ++   &  &  -   (;3)!         (  - 
Flexible Addressing: *      '  +  ) +   @ +7 ++   
      #   & + &    D + ! $    ## 
    -      - +  +     -  M @ 7  +- - +7
#  - + #   & + & D = 7       +- -  +  
 !    #7! $   &  
Standard-Based: ; /   ' +  / %'  % /G;$"/ (!  -  +
    +  7 - ##   ) % /G;$"/ (Q  -  +  )
&    /&     ! % /RG;$"/Q (! --  +  ) % /JG
QoS: *     - +  7  / ;$"/Q ( --  +  )  <- 
    7/ &  #9  ## & 7 :  ! * %' ++    ;$;/R - 
- -    & 7-    ! %1   /+     +7  
Provisioning Costs: $  # + &-  -      ! < +!
'         
  + - ##  7+  # '! 3.1 Reference Model
  7 #  '  -&    # - $ %' #       >-! Q! N
  !    :  +       (%:)!
$ %: 7 +     (%1 ) 
:/2  '    /2  ' + +    /+  ;%:$G;IN
 / ! $  %:     7 
 & + &    & + &  %:    + & D    ! :   
 + & 
'  :// :  - ://:  -     >-!   : 7    ;%:$G
 -  <4: *;  ;IN  /        !  : 
$ 3$      : %: &  &     
"7   +   7  #  #  &      / 
:/:  -
( !-! &  -   )! $   # 
*;  3$ <4: 37 
' ("3; 2<G"3; '4)
%'  &   +  $I"  
37  ' ($" >     + # :    +    
4 7 "3;)  +    :   +    :! *#  +  
37  %' :  + @- +     +  
         (  ) :
+ !   -   + /   
 /  !
3 Optical VPN (OVPN) * port-based OVPN  (-) +     
 - + &-   '! I##  ' 
 %'  & -&    + &   + ++   7     & ( :)   
#   +   -  + 7  -   = + ! I    
  -    + & +   +   %'       7 #  :
       # -  +7  -  ' *I     = !
   #   ! :   7      / %     connection-based OVPN 
  -    %' + &    &  77 -  (-) +    %'  
  #  & + & ! 27 -&-       =    ! ;  :   
 7  + #  +// + &-    &  +     7 
    %' + &  7    '  :  -  ' *I -  
 CC  &  DD #    & ! +  *I      !
 Z. Zhang et al./An Overview of Virtual Private Network (VPN)

Fig. 6. %' #   !

>-!      #    & ! "+ =      =    ++ 
'           ( %:)! #  ##   & + &    %'
% '  &    :     + -  !
  %:! % :  +  # + '! 
  #      7    '! ! $ %'  &  ++  '  /
 :     %'  -  +   -  7  9   -
   (/+    )! + G G  ( !-!  ;$;/GB</ 
 % /JG;$"/Q  # )!
! $ %'  &     /
3.2 OVPN Requirements      &  G
* %/   ! OQP =   # + /   - -        
+ & + &  %'  +   ! $    &   +  !
# -   7 =    7   ! $ %'  &  + & ++  #
#  OQP  #  =      ##  %' +-      -
#   OQP! $   7    +    +  #      7!

Fig. 7. %' @+ !


Z. Zhang et al./An Overview of Virtual Private Network (VPN) 

! $ %'  &  ++     %:) + ! " &    &  
 #     ! " &    :         : %:
%'  &   +    (      +  +  : %:)!
       G ! Q! $ %'  &     # 
! "/&   +  7      / ##  %'       -&  :
       &  & ! %:!
Q! >     + &- #  %' ! $ %'  &    - 
 &           -   7  ;    ## - 
   ?        &  +  7  +   #  
++       &    -  -   7  %'
 -   +#    7 ##    #     !
  ! R! $ %'  &   : +  
! $ %'  &     #   9  7     7   
##  %'       -&  : ( !-! *& *&Q ;   )  7 
%:!   # :  9   + G
R! $ %'  &  + &    #  @ ( !-! *    /
7  +    : %:  +   # )!
 (K)       +  - J! $ %'  &      
+  #  -&  %'!  ++     '   !
J! $ +#7 +   #  /
 7   7 + +   %' 3.3 OVPN Models
 &  + &   7  $ #7   =      & 
 -&  : %:       +     +   %'! $ 7  & 7
    -&  %'       + //+     +   
    +  #  %'!    &  ! *  & 7   
! $ %'  &   : %: +  +  7 # #  +      + &
#-    &    9  7 +//+  ! 8   + //+
    7    ( !-! *&    : : %:   %:   + +
  )  7    # : %:  -    + &-!
 9   + G #  @ ( !-! *
   # )! 3.3.1 The Overlay Model
! $ + & %'  &       - $ & 7        +
 #    - +  #       & - %'  & !  %' 
  & + &      +    &    # +//+ +
=      #        :! $ :   
  %'!     + -  :     &
!  &   %'  &   &  +//+  ! $ +//+  
+ & 7 +7 + & /+ &/ &  -  / &  - ! !  ! *  
-   #    - + 7 #     -   
( !-!   - CC+// DD /    ! $ +    + & 7 + & 
)!    # +  ! B    - /
! %+   &  + 7  +7       +    ! : #
 %' +-7   + %'             -  + &  
+ %' ! -   +  7! *       /
!  %'  7 &        ## & 7   !
%'  CC - DD     
+7  #   &     ##  3.3.2 Peer-to-Peer Model
%'  -   +7  # ! *      : %:  %:  : 
! $ %'  &     ++  - +  -   - + !
       -&  ( : : $   :   +  7  #  
 Z. Zhang et al./An Overview of Virtual Private Network (VPN)

   -   %:  : %:   3.3.4 Domain Service (DS) Based Model
   ! $ +      *      *  I;/     OP      
  +    !   : %:  +            & # /
 9  + & 7 7 *        ! $  +     + &  +//
    -- = ! :@-    7 + +    &    7  
- +    %;>  *;/*;           +    ! $
  +        /+ = ! *         # + +  #  
 + //+    + 7   + # *      & / - +  
  #   &- # -     %'  ! $   &
-- +   & +  # *! *    @&   -    + + ! $ 7
- #    -   + & D  77 =  #  +    
       #     : 9 # -+    +  
 7 7! $ + &-  #   %'! $ 7   &     
-    +9 !   +     +    
 7 7 +      &         ! $ #     
 +7   & 7  ! $ & 7     7 + &  +   & ! $
+     # +      *;      -       #
  D -      +7 +-7 -+ 7 + & ! >  7+ #
   !   *:$>    <"3;  &      7 7  +
 9?   +         +   +    -    #9
+ //+    &  ! >  &      -     %'
    & 7   &  + // +-7      #9   7  - +
+      #   4K-+  ! //  -+     + ! $ /
OP  ,-  3 ORP!    -  %' 9-  7
 7 ! *       / 
   -+  + / +  -+
    +  9  +   
3.3.3 Resource Partition (RP) Model +   +7 (  #  /  +  
*  4/     OP +  & + &  ++  # + / +  -+)     
## & 7 +   +        -&  %'G ! $   +   
 &  -  +  #  %1  K +   +7    -  6 
 ! :    #    +    +       +
  #  +      +-7   ! $      +  
+7  ! *   &     # #   %'       & +  
&  -  +  #       =       7  + !
+        @+7 + 9 ! $ $ &-   &-  #   
   + & +                +     
 -     &  + &- +  !    1  I OP!
%         7  @& 7 07/#/ & (0;) + &- # '
  7      ! *    & 8I" +      # 
  & 7        & -  0; =   # ##  ' 
+    &     ! $     0  ! OJP! * 0  ! OJP
 + &  +   -     &  -         /
 '  7     +  #      '  + 9  7    
   -  ! $    -    - +-7   a priori  #9  @! 
   #    &  -  +  # #    + & + '  + + ! $
        7  7    +    + &   7+  # -+ &
! $    ++    ++   '     ()    -+
        &   &  (I3)L /+ + +-   
+    ! %1      7  ' @& 76 ()
Z. Zhang et al./An Overview of Virtual Private Network (VPN) 

  -+ (;3)L /+ +   7      #  =    + &
+ '       (  :G% ##      =  ! $ 7 
&    + )     #  + -  7   +   ! ;     
  + &     7    ## - *:$> (+GG ! #! -) %*> (+GG !
       #  -+6  () 7  # !)  *$B/B (+GG !! -) 
-+ (N3)L /+ -+ +  #  - -   & & +    #7
   # + -+  %G:  :G%   # + 7 #   -? 
&    K     -+! +  ! $ 7 7 @- # 
I + -   0; =   #  '  -   & !
  #   -+      7  '
 #9! $ +  7  K &     3.5.1 IETF and OIF
=   #   '      $ '  - - +  *:$>   7
@?-    #9      7 ! $  -  + & + &  ' =  
& -  #  7 7    ##      ! * &     /   '
7   #  #        + & /-  ( + & ) :/   '
0  ! OJP     7  + #     /   7     '! $  =
  &  7 # 9-  - 7  +   7 '       
      &! *;   "3;  -    --  # 
 +  # #  & 7 # '
3.4 Issues or Future Works  & !  7    - - + #  *:$>
% #    * '  %'    7! ' &  #-       *  
               7    -  ?  0;
&     7     !    7 -    -  
  7   *   +    #  '! $ "3;  - - +   & +-
 +  # #    =7    ++  - 7    &/
   CC DD '  #  7  &    0;   9 #  & ! % 
&  #        !    *;   - - +    -
  #- '   +  7 -   +   #    7 7  --
+ &  ! '  -7 #  ##   7+- +   7     M @ 7
&   7    -     ++    #    - 7
 ! "   #    #9      9 7!
- -  '    #9  - # 4  7  # -  + ' & 
'! *     %'    &&  --  *:$>  %*> (+ *    -
-- +    : %:  : %: # ) OQRP! * %/   ! OQP  .  !
   : %:   %:6  - ORP  & =   # + & + & 
     # : : %:   %:6 + + &  + &     +    + /
   +     6 -+ - & 7!   %/   ! OP    
+ 6 ! 4     + &- 0;   & + &   ## %'  & 
-   %' + 7  - ! I## / + + !  + # -  &  (    ;%:$G
 %'   7 & ##   & ;IN  /        ) 
=   +     + &    -     -   & + &    & 
      #9 7  #7-   +  ! :      7
=  ! $     -  ##  ++ &  %*>      # ! (B* !)
 + -     +   +7  + 9 OJP   7  ++  %'  &
     '    +     +      B* !  B* !!
+7    - 7 '  !
3.5.2 ITU-T
3.5 Standardization Status *$B/$ 7 - +    7  -   
 7     # + +     * ' OP! * 4 #! OP 
+   * '  %'! $ + +    /   * ' & "3;    
 Z. Zhang et al./An Overview of Virtual Private Network (VPN)

  ! * &  ' K & "3;  !  +  #7 '   &  
*    &  +       *:$>  & ! $ # # '  & 7 + -!
'  - - +  :/   ++   
   /   7  ++  ! ; &  9
 #        & =  
 + &   4 #! OP! $    ++   # References
   /   '   9  2<G"3;
OP *$B/$ 4   .!      'L
(4> )  &   !  &   ('4) -        & =  !
   #  +7    #   OP *$B/$ 4   .!!      * '
    & ! '    &  +   * & "3;    !
-  #  -      7    OP 4!  ( !)  #   # 7  + & + & 
#    ! > #     #  / &  + &     *:$> I #  #/ #/++&+/#  /
 /Q!@   + -  (% )!
     & ! () 3  -  / OP '!  7 &  "3;  -  +  
  7 #  & ' * (  ;7  )!
     &  7 : (# :)   OP .! 1  3! I  '  &  + & +   
 '   (# :)! () I  -  7 ('%)  &   # * & +  ! # 
#   '    #  #  >%: () ++! !
OQP N! %/   ! ; & =   # + & 
:     : &-      + &     *:$> I #  #/ /&+/ = /
#  '! ()       # -  /!@   + - !
#  + /' :    #    # OP N! %/   ! 2<G<"3; +G$I" '
 :          7 *:$> I #  #/ / -+-+/&+/!@  
+ - !
# ! () 3;       - !
ORP :! .   ! ; & =   # + &  + &
 +  +  #  3;  -        %*>/R!   + - !
 3;     + &  +  #  - ' OJP %*> B    * # ! (B* !) %*>/!
         7  #9 # + '! (I   )!
>    * /; '   - OP $!    ;      -   
  ##    &   -   +  # '  +  # ' *:$> I #
 #/   // -/&+/!@   + - !
 '    ! OP :! ! 4  B # :/: *;   4>  ' *:$>
I #  #/ #/++&+/+ //!@   + - !
OP .! 4   :! ! 4  B # :/: <4:  *  4> 
' *:$> I #  #/ #/++&+/- /+//!@  
4 Conclusions + - !
OP N! %/2  <' <  ?  + & /+ & 
+ /   ' - 2<  <"3; *:$> I #  #/
*  ++  +    +  & & & #  /++&+/-&+/ -+-+/!@   + - !
 '! ;+ 97  & 7   &  7 # OP ! - K ++ 7    # &   /  
'       - +  - 7  ' ++   *:$> I #  #/- K/
++&+/&  /++ 7/!@   + - !
*;  <4:  "3;! 8   #  /
OP ! - ( !)      * '    -
     &   %' 7 ##  &    *:$> I #  #/ #/++&+/&+/& /!@
       7 =   #   + - !
%'  & + &    ! >7 OQP 3!   ' 3 #    *:$> I #  #/
  &  %'     ++      /++&+//#   /!@   + - !
   --     #   OP 2! 4K-+  ! * & +      #   
 #/ #/+/#   /!@  5 ()  
%'! + - !
$   # '   #  +  7 ORP ,! ,- 1! 3      # * & +    
   7 7! " #  &  ' ;*:G %+    "-?  &!  ! 
  +  #    &  7! *#   (% )!
OJP .! 0 ! ;&- 2! 3     7 #
# -/   +      
+ &- &  + &     (')  0; &
    + # +  7 #   + 8I"     ;*:G %+    -
      ' #   ! &  7 "-?  ;+  *     $ -  # *
# '   #7  /&  +  *    - &!  !  (" G+  ) ++! Q!
Z. Zhang et al./An Overview of Virtual Private Network (VPN) 

OP .! 0 2! 3 ,! ,- 0; + &- # '   & Bo Li  &   2!;! ( 
    (')! ;   # +  (5 )!  )  "!;!  -    +
OP I! >   ! <   - + (<4:) ;  #  $- B& 7 2 K-
*:$> 4> R ("  )! !4!   JR  JRJ + & 7
OP ;!   4!   ;  7    #  *     !I!  -   +
+  *:$> 4>  (&  JJR)! :- - #  B& 7 # "/
OP "! 3  ;% ; +  &   *:$> 4> JR       JJ! 2  
("  JJQ)! JJ  JJQ     -
OP :! 4   ! "+     -     + #     $"    
*:$> 4>  (5 7 )! *2"    - ;7  I& 4    $ -    
OP :! 4  .! 4   2<G"3; ' *:$> 4>   ! ; 5 7 JJQ      N- -
("  JJJ)! B& 7 # ;   $ -7    7  
OQP 8! $  7  ! 37    - +  CC3$DD + #    + ;  I +  ! N  7
*:$> 4> QQ (- JJJ)!   K    +  " # 4    ! N
        &   +    
         7    
+! N  +   &  K  ++    &  !
Zhensheng Zhang  &   !I!  N        # *::: $   8  
   - - #   B& 7  *::: $   '  $ -7
# #  3 -    JRJ! N   "G 5  # 8       (8*:$) *:::
 7  ; I - 4      5  # ;        (5; )L8  
 + *& - ! N &  " #  ;    " "  +- 
4        #    4 & (" 4) : &  N    
   ;      I +   ;*:G %+    - "-? (%") * ;G*:::
# ;7      #  7   5  #       (5 )! N  &   
+  #  --   @/-  / -   # *:::  "-? ;+  * 
 +        -  &   -     "      - (+  )
<"3;   #   !    *::: 5   ;        ;+  *
K- ;            #  @ <   %+ 8I"     (%
2  3     3  $ -  #-      )   "  #  :& 4 & ;+  * 
 & +   $"G;%:$ #    * & 8I"! N "  +- (I   )  ;*:G %+
 +      ++    "G*::: $       "-? ;+  *  8&  - 4     
   - *::: 5;  *::: $           :@+   (5 7G>  7 )!
 7  "G*::: #  ! N        7    /-   #   +    # *:::
       * & 8I"     <"3;  + // 5   ;         4   & 
+    ! N   &   <  : #  *::: 5;   & /%& 7       07 # ; & I & 7 
+    %& 7       +    * '   $+-7    ! *  N   &&  
& I8I"     %    5  # 8    -?- &  #   +! *::: *#  JJQ! N
               - JJQ!   /$  # *::: *# !
 7   : # *::: $   8  
        # %+    
"-?  "   3 - # *::: ; I -  ! I ! ,- Ya-Qin Zhang   7 
   -    # 2   8      - "-- I  # " # 4   
;7+     % !N   +  #  JRR ! N  + &7  I  #
 2  ++ ; +   ! "  $ -7 3   7 
; ##  +      5! N
   &  #  ++  
Q B!;! +  -    - & 
Dr. Xiaowen Chu  &   2!:-! *          
 -   + ;  #  ! "7 #   - 
$- B& 7 !4!   JJJ       & +  &    #  /+
  !I!  -   + &     +      !
;  #  N- - B& 7 # N    >  # *:::  JJ! N   : //
;   $ -7  ! N   # #  *::: $4; $*%; % *4 B*$; I
 7   + #    ;.;$:"; >%4 '*I:% $: N%3%<. #  57 JJ 
I +   # + ;   N- JJJ! N  &    :    #  &   + # 
- 2+ B& 7! N     K   &  ?  #   ! N   
    %+ 8I"     &      *;%G":<  *$B  ? ## 
N-/+ #  4-  ; -  - &    ! N  &      #   
 *   ;  7! # #  ?  -/  + !

You might also like