Skip to main content

Application of VPN Based on L2TP and User’s Access Rights in Campus Network

  • Conference paper
  • First Online:
Advances in Brain Inspired Cognitive Systems (BICS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10989))

Included in the following conference series:

  • 2501 Accesses

Abstract

VPN is widely used in colleges and universities at present, having brought great convenience to teachers and students in their study and life. Due to the fact that the current VPN in colleges and universities has the same access rights to all users, as long as VPN users login successfully via VPN account, they can access the campus network. As a result, not only is the management of the VPN administrators troublesome, but also the security of the network environment in the school is not very good. In view of this problem, this paper proposes a method that people visit the campus network resources according to user’s access authority in which the distribution of access rights can be distributed according to user’s identity category or individual way, and gives the application in college campus network. Finally, the simulation results show that this system is feasible to guarantee the security of communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, J., Li, Y., et al.: A real-time network simulation infrastructure based on OpenVPN. J. Syst. Softw. 82(3), 473–485 (2008). https://doi.org/10.1016/j.jss.2008.08.015

    Article  Google Scholar 

  2. Zhao, G.: Research on VPN network system using IPSec protocol. Energy Procedia 13, 2367–2373 (2011). https://doi.org/10.1016/j.egypro.2011.11.339

    Article  Google Scholar 

  3. Yang, F.F., Sun, Q., Wang, B.: Application of L2TP over IPSec technology in private desktop cloud. Comput. Technol. Dev. 25(10), 160–165 (2015). https://doi.org/10.3969/j.issn.1673-629X.2015.10.035

    Article  Google Scholar 

  4. Zhang, W., Wang, F.Y.: Research and implementation of GRE over IPsec VPN in combination with NAT. J. Shandong Univ. Technol. 31(3), 6–10 (2017). https://doi.org/10.13367/j.cnki.sdgc.2017.03.002

    Article  Google Scholar 

  5. Tatsuya, T., et al.: Evaluation of remote access VPN with dynamic port randomization function by mobile codes. J-STAGE 37, 119–124 (2009). https://doi.org/10.11485/itetr.33.37.0_119

    Article  Google Scholar 

  6. Sun, G.Y.: VPN simulation based on GRE and IPSec protocols. J. Shaanxi Univ. Technol. (Nat. Sci. Ed.) 34(1), 49–55 (2018)

    Google Scholar 

  7. Jiang, Y.F.: VPN experiment design and implementation based on Windows Server 2012. Comput. Sci. Appl. 7(8), 793–803 (2017). https://doi.org/10.12677/csa.2017.78091

    Article  Google Scholar 

  8. Li, C.: The implementation and performance analysis of Campus network IPSec VPN system. J. Panzhihua Univ. 34(2), 35–40 (2017)

    Google Scholar 

  9. Zhang, Z.: Application of SSL VPN in campus network. J. Puer Univ. 31(3), 33–37 (2015)

    Google Scholar 

  10. Qing, H.: A new method of VPN based on LSP technology. In: 2nd Joint International Mechanical, Electronic and Information Technology Conference, Chongqing, China (2017)

    Google Scholar 

  11. Lu, B.: Research on user identification algorithm based on massive multi-site VPN log. In: 17th IEEE International Conference on Communication Technology, Chengdu, Sichuan, China (2017)

    Google Scholar 

  12. Chen, H.: Design and implementation of secure enterprise network based on DMVPN. In: International Conference on Business Management and Electronic Information, Guangzhou Guangdong, China (2011)

    Google Scholar 

  13. Gao, P., Ren, J.: Analysis and realization of Snort-based intrusion detection system. Comput. Appl. Softw. 23(8), 134–135+138 (2006)

    Google Scholar 

  14. Zhao, H., Ren, J.: Cognitive computation of compressed sensing for watermark signal measurement. Cogn. Comput. 8(2), 246–260 (2016)

    Article  MathSciNet  Google Scholar 

  15. Zhou, Y.: Hierarchical visual perception and two-dimensional compressive sensing for effective content-based color image retrieval. Cogn. Comput. 8(5), 877–889 (2016)

    Article  Google Scholar 

Download references

Acknowledgements

This work was funded by the ministry of education has a collaborative education Project (Grant No. 201702109077), Natural Science Foundation of Fuyang Normal University (Grant No. 2016PPWL19), Anhui provincial university student innovation and entrepreneurship Project (Grant No. 201710371103), the Key Project of Fuyang Normal University (Grant No. hx2017007), Natural Science Foundation of Fuyang Normal University (Grant No. 2017PPJY04).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shuying Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, S., Zeng, T., Chao, Y., Wang, H. (2018). Application of VPN Based on L2TP and User’s Access Rights in Campus Network. In: Ren, J., et al. Advances in Brain Inspired Cognitive Systems. BICS 2018. Lecture Notes in Computer Science(), vol 10989. Springer, Cham. https://doi.org/10.1007/978-3-030-00563-4_66

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00563-4_66

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00562-7

  • Online ISBN: 978-3-030-00563-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics