The Concept of Virtual Private Network for Industrial Routers


1. Virtual private network VPN is a technology that relies on ISP and other NSP to establish a dedicated data communication industrial router network in the public network. The so-called virtual, refers to the user no longer needs to have the actual long-distance line, but USES the Internet public data network long-distance data network. The so-called industrial router private network refers to the network that users can develop for themselves to meet their needs. Classification: remote access virtual network; Virtual network within enterprise; Enterprise extends virtual networking. Function: provides data encryption, information authentication, identity authentication, access control. Features: low cost, flexibility, easy to manage and maintain.





2) Cryptography: cryptography can be generally divided into symmetric key encryption and asymmetric key encryption, and key management is also a very important technology. 2) Identity authentication technology: authentication technology prevents data forgery and modification, and adopts a technology called "message digest". 3) Tunnel technology: the core technology of VPN. There are two kinds of industrial wireless router: voluntary tunnel and forced tunnel.

The deployment of intrusion detection system is based on the deployment of network intrusion detection system. Intrusion detection system based on industrial 3G router network can be deployed in multiple locations. In general, the deployment point of intrusion detection can be divided into four locations: (1) DMZ zone, (2) external network entrance, (3) internal network trunk, (4) key subnet

After the deployment and configuration of network-based intrusion detection system, the deployment of host-based intrusion detection system can provide the system with high-level protection. The intrusion detection system based on full network communication industry level router is mainly installed on key hosts, which can reduce the cost of planning and deployment, so that the management effort is focused on the most important and most important protection device.

To facilitate a timely examination of the results of the mainframe's intrusion detection system, it needs to be focused on the logs that are generated by the system. The complexity and difficulty of routine maintenance of network security systems for industrial 4G routers can be greatly reduced by conducting centralized analysis, sorting and displaying.

3. Principles of tunnel technology. Tunnel technology is a kind of through the use of the infrastructure of the Internet in the way to transfer data between network. Tunneling technology encapsulates data and establishes a data channel (tunnel) on the public network through which packets of industrial 4G routers are transmitted. Tunnels are formed by tunnel protocols, and the tunnel protocol will be sent in the tunnels through the data frames or bags of the different protocols that are passed through the tunnels, and they're re-encapsulated in the new envelope. The new packet header provides routing information for industrial-grade 4G routers, enabling encapsulated load data to be transmitted over interconnected networks. Tunnel technology refers to the package data packaging, transport package, the whole process of reconciliation.

---------------------------------------------------------------


Comments

Popular Posts