Abstract
VPN is widely used in colleges and universities at present, having brought great convenience to teachers and students in their study and life. Due to the fact that the current VPN in colleges and universities has the same access rights to all users, as long as VPN users login successfully via VPN account, they can access the campus network. As a result, not only is the management of the VPN administrators troublesome, but also the security of the network environment in the school is not very good. In view of this problem, this paper proposes a method that people visit the campus network resources according to user’s access authority in which the distribution of access rights can be distributed according to user’s identity category or individual way, and gives the application in college campus network. Finally, the simulation results show that this system is feasible to guarantee the security of communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu, J., Li, Y., et al.: A real-time network simulation infrastructure based on OpenVPN. J. Syst. Softw. 82(3), 473–485 (2008). https://doi.org/10.1016/j.jss.2008.08.015
Zhao, G.: Research on VPN network system using IPSec protocol. Energy Procedia 13, 2367–2373 (2011). https://doi.org/10.1016/j.egypro.2011.11.339
Yang, F.F., Sun, Q., Wang, B.: Application of L2TP over IPSec technology in private desktop cloud. Comput. Technol. Dev. 25(10), 160–165 (2015). https://doi.org/10.3969/j.issn.1673-629X.2015.10.035
Zhang, W., Wang, F.Y.: Research and implementation of GRE over IPsec VPN in combination with NAT. J. Shandong Univ. Technol. 31(3), 6–10 (2017). https://doi.org/10.13367/j.cnki.sdgc.2017.03.002
Tatsuya, T., et al.: Evaluation of remote access VPN with dynamic port randomization function by mobile codes. J-STAGE 37, 119–124 (2009). https://doi.org/10.11485/itetr.33.37.0_119
Sun, G.Y.: VPN simulation based on GRE and IPSec protocols. J. Shaanxi Univ. Technol. (Nat. Sci. Ed.) 34(1), 49–55 (2018)
Jiang, Y.F.: VPN experiment design and implementation based on Windows Server 2012. Comput. Sci. Appl. 7(8), 793–803 (2017). https://doi.org/10.12677/csa.2017.78091
Li, C.: The implementation and performance analysis of Campus network IPSec VPN system. J. Panzhihua Univ. 34(2), 35–40 (2017)
Zhang, Z.: Application of SSL VPN in campus network. J. Puer Univ. 31(3), 33–37 (2015)
Qing, H.: A new method of VPN based on LSP technology. In: 2nd Joint International Mechanical, Electronic and Information Technology Conference, Chongqing, China (2017)
Lu, B.: Research on user identification algorithm based on massive multi-site VPN log. In: 17th IEEE International Conference on Communication Technology, Chengdu, Sichuan, China (2017)
Chen, H.: Design and implementation of secure enterprise network based on DMVPN. In: International Conference on Business Management and Electronic Information, Guangzhou Guangdong, China (2011)
Gao, P., Ren, J.: Analysis and realization of Snort-based intrusion detection system. Comput. Appl. Softw. 23(8), 134–135+138 (2006)
Zhao, H., Ren, J.: Cognitive computation of compressed sensing for watermark signal measurement. Cogn. Comput. 8(2), 246–260 (2016)
Zhou, Y.: Hierarchical visual perception and two-dimensional compressive sensing for effective content-based color image retrieval. Cogn. Comput. 8(5), 877–889 (2016)
Acknowledgements
This work was funded by the ministry of education has a collaborative education Project (Grant No. 201702109077), Natural Science Foundation of Fuyang Normal University (Grant No. 2016PPWL19), Anhui provincial university student innovation and entrepreneurship Project (Grant No. 201710371103), the Key Project of Fuyang Normal University (Grant No. hx2017007), Natural Science Foundation of Fuyang Normal University (Grant No. 2017PPJY04).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, S., Zeng, T., Chao, Y., Wang, H. (2018). Application of VPN Based on L2TP and User’s Access Rights in Campus Network. In: Ren, J., et al. Advances in Brain Inspired Cognitive Systems. BICS 2018. Lecture Notes in Computer Science(), vol 10989. Springer, Cham. https://doi.org/10.1007/978-3-030-00563-4_66
Download citation
DOI: https://doi.org/10.1007/978-3-030-00563-4_66
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00562-7
Online ISBN: 978-3-030-00563-4
eBook Packages: Computer ScienceComputer Science (R0)