The Concept of Virtual Private Network for Industrial Routers
1. Virtual private network VPN is a
technology that relies on ISP and other NSP to establish a dedicated data
communication industrial router
network in the public network. The so-called virtual, refers to the user no
longer needs to have the actual long-distance line, but USES the Internet
public data network long-distance data network. The so-called industrial router
private network refers to the network that users can develop for themselves to
meet their needs. Classification: remote access virtual network; Virtual
network within enterprise; Enterprise extends virtual networking. Function:
provides data encryption, information authentication, identity authentication,
access control. Features: low cost, flexibility, easy to manage and maintain.
2) Cryptography: cryptography can be
generally divided into symmetric key encryption and asymmetric key encryption,
and key management is also a very important technology. 2) Identity
authentication technology: authentication technology prevents data forgery and
modification, and adopts a technology called "message digest". 3) Tunnel
technology: the core technology of VPN. There are two kinds of industrial
wireless router: voluntary tunnel and forced tunnel.
The deployment of intrusion detection
system is based on the deployment of network intrusion detection system.
Intrusion detection system based on industrial 3G router network can be
deployed in multiple locations. In general, the deployment point of intrusion
detection can be divided into four locations: (1) DMZ zone, (2) external
network entrance, (3) internal network trunk, (4) key subnet
After the deployment and configuration of
network-based intrusion detection system, the deployment of host-based
intrusion detection system can provide the system with high-level protection.
The intrusion detection system based on full network communication industry
level router is mainly installed on key hosts, which can reduce the cost of
planning and deployment, so that the management effort is focused on the most
important and most important protection device.
To facilitate a timely examination of the
results of the mainframe's intrusion detection system, it needs to be focused
on the logs that are generated by the system. The complexity and difficulty of
routine maintenance of network security systems for industrial 4G routers can
be greatly reduced by conducting centralized analysis, sorting and displaying.
3. Principles of tunnel technology. Tunnel
technology is a kind of through the use of the infrastructure of the Internet
in the way to transfer data between network. Tunneling technology encapsulates
data and establishes a data channel (tunnel) on the public network through
which packets of industrial 4G routers are transmitted. Tunnels are formed by
tunnel protocols, and the tunnel protocol will be sent in the tunnels through the
data frames or bags of the different protocols that are passed through the
tunnels, and they're re-encapsulated in the new envelope. The new packet header
provides routing information for industrial-grade 4G routers, enabling
encapsulated load data to be transmitted over interconnected networks. Tunnel
technology refers to the package data packaging, transport package, the whole
process of reconciliation.
---------------------------------------------------------------
Comments
Post a Comment