+

CN117134991A - Safety encryption protection system for traffic information release system - Google Patents

Safety encryption protection system for traffic information release system Download PDF

Info

Publication number
CN117134991A
CN117134991A CN202311337067.XA CN202311337067A CN117134991A CN 117134991 A CN117134991 A CN 117134991A CN 202311337067 A CN202311337067 A CN 202311337067A CN 117134991 A CN117134991 A CN 117134991A
Authority
CN
China
Prior art keywords
ipsec
nat
security
traffic
ensure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311337067.XA
Other languages
Chinese (zh)
Inventor
陈光宇
杜江涛
宋洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Huanyu Boya Technology Co ltd
Original Assignee
Beijing Huanyu Boya Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Huanyu Boya Technology Co ltd filed Critical Beijing Huanyu Boya Technology Co ltd
Priority to CN202311337067.XA priority Critical patent/CN117134991A/en
Publication of CN117134991A publication Critical patent/CN117134991A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/164Adaptation or special uses of UDP protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a safety encryption protection system for a traffic information release system, which comprises: IPsec module: UDP encapsulation is used in IPsec to allow IPsec traffic to pass through NAT devices; IPsec endpoint configuration module: configuring an IPsec endpoint to use UDP encapsulation; NAT equipment configuration module: configuring NAT equipment to support UDP encapsulated IPsec traffic; NAT traversing setting module: enabling NAT traversal protocol to ensure IPsec traffic can traverse NAT equipment, and enabling the IPsec traffic to process and bypass the limitation of the NAT equipment; a security policy configuration module: configuring security policies, including authentication and key exchange, ensuring that communications between IPsec endpoints are protected and that only authorized users can establish secure connections; test and monitor module: before the actual deployment, tests are performed to ensure that IPsec configuration and NAT device settings work properly. The invention provides higher security and availability for the traffic information release system by solving the NAT traversal problem.

Description

一种针对交通信息发布系统的安全加密防护系统A security encryption protection system for traffic information release system

技术领域Technical field

本发明涉及交通网络技术领域,特别涉及一种针对交通信息发布系统的安全加密防护系统。The invention relates to the technical field of transportation networks, and in particular to a security encryption protection system for a traffic information release system.

背景技术Background technique

交通信息发布系统通常需要使用安全加密措施来确保信息的机密性、完整性和可用性。这是因为交通信息可能包含敏感数据,例如交通监控摄像头的视频流、交通信号灯状态、交通事件报告,如果这些信息在传输或存储过程中未加密,可能会面临安全风险。现有技术中会使用IPsec(Internet Protocol Security)来加密交通信息发布系统中的通信链路。IPsec是一种广泛应用的协议套件,用于保护网络通信的机密性和完整性,它可以用于安全地加密和认证数据包在网络中的传输,但是IPsec的网络地址转换(NAT)可能引发IPsec流量的问题,因为IPsec认证和加密通常涉及IP地址和端口,而NAT会更改数据包的源和目的地址。Traffic information release systems usually require the use of security encryption measures to ensure the confidentiality, integrity and availability of information. This is because traffic information may contain sensitive data, such as video streams from traffic surveillance cameras, traffic light status, traffic incident reports, which may be subject to security risks if it is not encrypted during transmission or storage. In the existing technology, IPsec (Internet Protocol Security) is used to encrypt communication links in the traffic information release system. IPsec is a widely used protocol suite used to protect the confidentiality and integrity of network communications. It can be used to securely encrypt and authenticate the transmission of data packets in the network, but IPsec's Network Address Translation (NAT) may cause There is a problem with IPsec traffic because IPsec authentication and encryption usually involve IP addresses and ports, and NAT changes the source and destination addresses of packets.

发明内容Contents of the invention

为了解决以上问题,本发明提供了一种针对交通信息发布系统的安全加密防护系统。In order to solve the above problems, the present invention provides a security encryption protection system for a traffic information release system.

为实现上述目的,本发明所采用的技术方案如下:In order to achieve the above objects, the technical solutions adopted by the present invention are as follows:

一种针对交通信息发布系统的安全加密防护系统,包括:A security encryption protection system for traffic information release systems, including:

IPsec模块:在IPsec中使用UDP封装以允许IPsec流量通过NAT设备;IPsec module: Use UDP encapsulation in IPsec to allow IPsec traffic to pass through NAT devices;

IPsec端点配置模块:配置IPsec端点以使用UDP封装;IPsec endpoint configuration module: Configure IPsec endpoints to use UDP encapsulation;

NAT设备配置模块:配置NAT设备以支持UDP封装的IPsec流量;NAT device configuration module: Configure the NAT device to support UDP-encapsulated IPsec traffic;

NAT穿越设置模块:启用NAT穿越协议,以确保IPsec流量可以穿越NAT设备,NAT穿越协议使IPsec流量能够处理并绕过NAT设备的限制;NAT traversal setting module: Enable NAT traversal protocol to ensure that IPsec traffic can traverse NAT devices. NAT traversal protocol enables IPsec traffic to process and bypass the restrictions of NAT devices;

安全策略配置模块:配置安全策略,包括身份验证和密钥交换,确保IPsec端点之间的通信是受保护的,并且仅受权用户可以建立安全连接;Security policy configuration module: Configure security policies, including authentication and key exchange, to ensure that communications between IPsec endpoints are protected and only authorized users can establish secure connections;

测试和监控模块:在实际部署之前,进行测试以确保IPsec配置和NAT设备的设置正常工作。Testing and Monitoring Module: Before actual deployment, perform testing to ensure that the IPsec configuration and NAT device settings are working properly.

进一步的:所述IPsec模块包括:Further: the IPsec module includes:

确保所选的IPsec实现支持NAT穿越;Make sure the selected IPsec implementation supports NAT traversal;

在IPsec配置中,选择使用UDP封装的ESP协议,设置以下参数:In the IPsec configuration, select the ESP protocol using UDP encapsulation and set the following parameters:

ESP封装模式:选择UDP封装;ESP encapsulation mode: select UDP encapsulation;

UDP端口号:指定用于封装IPsec流量的UDP端口号;UDP port number: Specify the UDP port number used to encapsulate IPsec traffic;

配置其他IPsec参数:除了UDP封装外,还需要配置其他IPsec参数,以确保通信的机密性和完整性;Configure other IPsec parameters: In addition to UDP encapsulation, other IPsec parameters need to be configured to ensure the confidentiality and integrity of communication;

定义和管理IPsec安全关联:配置IPsec安全关联,定义通信的安全参数;Define and manage IPsec security associations: configure IPsec security associations and define security parameters for communication;

配置IPsec端点:在交通信息发布系统的两个端点上配置IPsec,确保它们使用相同的IPsec配置和参数。Configure IPsec endpoints: Configure IPsec on both endpoints of the traffic information publishing system, ensuring that they use the same IPsec configuration and parameters.

进一步的:所述IPsec端点配置模块包括:Further: the IPsec endpoint configuration module includes:

在IPsec配置中,将ESP封装模式设置为使用UDP封装;In the IPsec configuration, set the ESP encapsulation mode to use UDP encapsulation;

指定UDP端口号,用于封装IPsec流量;Specify the UDP port number for encapsulating IPsec traffic;

确保将ESP报文尺寸配置为适当的值,以适应网络中的最大MTU大小。Make sure to configure the ESP packet size to an appropriate value to accommodate the maximum MTU size in the network.

进一步的:所述NAT设备配置模块包括:Further: the NAT device configuration module includes:

登录到NAT设备管理界面,找到NAT规则配置部分;Log in to the NAT device management interface and find the NAT rule configuration section;

在NAT规则中,配置UDP端口映射,将UDP端口号映射到正确的内部IPsec端点,确保UDP端口号与IPsec端点的配置相匹配,以便UDP封装的IPsec流量能够正确路由到目标;In the NAT rule, configure UDP port mapping to map the UDP port number to the correct internal IPsec endpoint, ensuring that the UDP port number matches the configuration of the IPsec endpoint so that UDP-encapsulated IPsec traffic can be correctly routed to the destination;

确保NAT设备不会更改IPsec报头信息,包括源和目的IP地址;Ensure that NAT devices do not change IPsec header information, including source and destination IP addresses;

启用UDP穿越确保NAT设备能够正确处理UDP封装的IPsec流量;Enabling UDP traversal ensures that the NAT device can correctly handle UDP-encapsulated IPsec traffic;

在完成配置后,进行测试以确保UDP封装的IPsec流量能够通过NAT设备,验证IPsec连接是否可以正常建立和传输数据。After completing the configuration, perform tests to ensure that UDP-encapsulated IPsec traffic can pass through the NAT device and verify that the IPsec connection can be established and transmit data normally.

进一步的:所述NAT穿越设置模块包括:Further: the NAT traversal setting module includes:

启用NAT穿越;Enable NAT traversal;

配置NAT穿越参数,以适应的网络环境;Configure NAT traversal parameters to adapt to the network environment;

完成NAT穿越设置后,进行测试以验证IPsec流量是否能够成功穿越NAT设备,确保IPsec连接可以正常建立和传输数据。After completing the NAT traversal settings, perform a test to verify whether IPsec traffic can successfully traverse the NAT device and ensure that the IPsec connection can be established and data can be transmitted normally.

进一步的:所述安全策略配置模块包括:Further: the security policy configuration module includes:

在IPsec配置中,选择适当的身份验证方法,以确保合法用户可以建立连接;In the IPsec configuration, select an appropriate authentication method to ensure that legitimate users can establish connections;

配置IKE参数,包括密钥协商阶段的参数,参数用于安全关联的建立和密钥协商;Configure IKE parameters, including parameters in the key negotiation phase, which are used for the establishment of security associations and key negotiation;

创建一个或多个安全关联配置,定义与对等方的安全通信参数;Create one or more security association configurations that define secure communication parameters with peers;

将安全关联分配给IPsec端点,以确保它们共享相同的安全策略,确保配置的参数与对等方的配置一致,以便建立和维护安全连接;Assign security associations to IPsec endpoints to ensure that they share the same security policy and that configured parameters are consistent with those of the peer in order to establish and maintain secure connections;

当两个IPsec端点尝试建立连接时,执行IKE协议的密钥协商,以生成用于加密和认证数据的密钥;When two IPsec endpoints attempt to establish a connection, key negotiation of the IKE protocol is performed to generate keys used to encrypt and authenticate data;

定期监控安全连接的性能和活动,以确保它们仍然受到保护。Regularly monitor the performance and activity of secure connections to ensure they remain protected.

进一步的:所述测试和监控模块包括:Further: the testing and monitoring modules include:

在实际部署之前,执行初步测试,包括以下方面:Before actual deployment, perform preliminary testing, including the following:

建立IPsec连接:确保IPsec连接可以成功建立,并数据可以在两个端点之间传输;Establish IPsec connection: Ensure that the IPsec connection can be successfully established and data can be transferred between the two endpoints;

NAT穿越测试:验证NAT穿越是否正常工作,IPsec流量能够通过NAT设备;NAT traversal test: Verify that NAT traversal is working properly and IPsec traffic can pass through the NAT device;

安全策略测试:确保安全策略配置正确,只有合法用户能够建立连接;Security policy testing: Ensure that the security policy is configured correctly and only legitimate users can establish connections;

数据传输测试:传输数据并验证数据的完整性和机密性;Data transmission testing: transmit data and verify data integrity and confidentiality;

进行性能测试以评估IPsec连接的性能,测量连接的带宽、延迟和吞吐量;Conduct performance testing to evaluate the performance of IPsec connections, measuring the bandwidth, latency and throughput of the connection;

配置系统监控,以跟踪连接的活动和性能;Configure system monitoring to track connection activity and performance;

定期检查系统的性能和安全状况,监控连接的稳定性和性能,并查看安全审计日志以检测潜在的安全问题;Regularly check the performance and security status of the system, monitor the stability and performance of connections, and review security audit logs to detect potential security issues;

在系统运行过程中,根据监控结果,对配置和参数进行更新和维护,确保安全策略、密钥和证书仍然有效,并符合最佳安全实践;During system operation, update and maintain configurations and parameters based on monitoring results to ensure that security policies, keys and certificates are still valid and comply with best security practices;

设置事件响应计划,以处理安全事件和问题,当检测到异常或安全事件时,采取适当的措施。Set up an incident response plan to handle security incidents and issues and take appropriate action when anomalies or security incidents are detected.

本发明与现有技术相比,所取得的技术进步在于:Compared with the existing technology, the technical progress achieved by this invention is:

本发明解决了NAT穿越问题,通过正确配置IPsec,UDP封装,NAT设备,以及启用NAT穿越协议,确保IPsec流量能够安全穿越NAT设备,而不受NAT的影响,因为许多交通信息发布系统需要跨越不同网络和设备,包括NAT设备。The present invention solves the problem of NAT traversal. By correctly configuring IPsec, UDP encapsulation, NAT equipment, and enabling the NAT traversal protocol, it ensures that IPsec traffic can safely traverse the NAT equipment without being affected by NAT, because many traffic information release systems need to cross different Networks and devices, including NAT devices.

IPsec的使用确保了交通信息的机密性和完整性,加密保护了数据的隐私,同时认证和完整性检查确保了数据在传输过程中未被篡改,这对于交通信息的安全非常重要,以防止虚假信息或数据泄露。The use of IPsec ensures the confidentiality and integrity of traffic information, encryption protects the privacy of data, while authentication and integrity checks ensure that the data has not been tampered with during transmission, which is very important for the security of traffic information to prevent falsehoods Information or data leakage.

本发明允许安全地在不同城市或地区之间传输交通信息,这是对于跨地域的交通信息发布系统至关重要,因为它可以提供跨越不同地理位置的实时数据。通过配置IPsec,可以实施强大的身份验证和密钥管理机制,确保只有授权用户和设备能够建立连接,有助于防止未经授权的访问。The present invention allows the secure transmission of traffic information between different cities or regions, which is crucial for cross-regional traffic information release systems because it can provide real-time data across different geographical locations. By configuring IPsec, you can implement strong authentication and key management mechanisms to ensure that only authorized users and devices can establish connections, helping to prevent unauthorized access.

本发明可以根据特定系统和网络需求进行配置和定制,这种可配置性使其适用于各种不同规模和类型的交通信息发布系统。通过实时监控系统的性能和安全性,可以及时检测潜在问题并采取适当的措施,有助于维护系统的可用性和安全性。The invention can be configured and customized according to specific system and network requirements, and this configurability makes it suitable for traffic information release systems of various sizes and types. By monitoring the performance and security of the system in real time, potential problems can be detected in time and appropriate measures can be taken, helping to maintain the availability and security of the system.

综上,本发明通过解决NAT穿越问题、提供数据机密性和完整性、支持跨地域通信、实施强大的身份验证和密钥管理、以及具有监控和事件响应功能,为交通信息发布系统提供了更高级的安全性和可用性。它有助于确保交通信息的准确性和可靠性,同时保护敏感数据不受未经授权的访问。In summary, the present invention provides better solutions for the traffic information release system by solving the NAT traversal problem, providing data confidentiality and integrity, supporting cross-regional communication, implementing powerful identity verification and key management, and having monitoring and event response functions. Advanced security and usability. It helps ensure the accuracy and reliability of traffic information while protecting sensitive data from unauthorized access.

附图说明Description of the drawings

附图用来提供对本发明的进一步理解,并且构成说明书的一部分,与本发明的实施例一起用于解释本发明,并不构成对本发明的限制。The drawings are used to provide a further understanding of the present invention and constitute a part of the specification. They are used to explain the present invention together with the embodiments of the present invention and do not constitute a limitation of the present invention.

在附图中:In the attached picture:

图1为本发明的系统结构图。Figure 1 is a system structure diagram of the present invention.

具体实施方式Detailed ways

下面这几个具体的实施例可以相互结合,对于相同或相似的概念或过程可能在某些实施例中不再赘述。下面将结合附图,对本发明的实施例进行描述。The following specific embodiments can be combined with each other, and the same or similar concepts or processes may not be described again in some embodiments. The embodiments of the present invention will be described below with reference to the accompanying drawings.

如图1所示的,本发明公开了一种针对交通信息发布系统的安全加密防护系统,包括:As shown in Figure 1, the present invention discloses a security encryption protection system for traffic information release systems, including:

IPsec模块:IPsec module:

选择支持NAT穿越的IPsec配置,在IPsec中,使用UDP封装以允许IPsec流量通过NAT设备。:Select an IPsec configuration that supports NAT traversal, where UDP encapsulation is used in IPsec to allow IPsec traffic to pass through the NAT device. :

IPsec端点配置模块IPsec endpoint configuration module

配置IPsec端点以使用UDP封装。具体来说,配置IPsec以使用UDP封装的ESP(EncapsulatingSecurityPayload)协议,允许将IPsec流量封装在UDP数据包中。这通常涉及配置以下参数:Configure the IPsec endpoint to use UDP encapsulation. Specifically, configuring IPsec to use the UDP-encapsulated ESP (EncapsulatingSecurityPayload) protocol allows IPsec traffic to be encapsulated in UDP packets. This typically involves configuring the following parameters:

ESP封装模式:使用UDP封装ESP encapsulation mode: use UDP encapsulation

UDP端口号:指定UDP端口号,用于封装IPsec流量UDP port number: Specify the UDP port number used to encapsulate IPsec traffic

ESP报文尺寸:确定每个ESP报文的最大尺寸ESP packet size: determine the maximum size of each ESP packet

NAT设备配置模块:NAT device configuration module:

配置NAT设备以支持UDP封装的IPsec流量。确保NAT设备不会更改IPsec报头信息,包括源和目的IP地址,以及UDP端口号。具体的NAT规则和配置将取决于NAT设备的型号和制造商。Configure the NAT device to support UDP-encapsulated IPsec traffic. Ensure that the NAT device does not change IPsec header information, including source and destination IP addresses, and UDP port numbers. Specific NAT rules and configuration will depend on the model and manufacturer of the NAT device.

NAT穿越设置模块:NAT traversal setting module:

启用NAT穿越协议,如NAT-T,以确保IPsec流量可以穿越NAT设备。NAT穿越协议使IPsec流量能够正确处理并绕过NAT设备的限制。Enable NAT traversal protocols, such as NAT-T, to ensure that IPsec traffic can traverse the NAT device. The NAT traversal protocol enables IPsec traffic to be processed correctly and bypass the restrictions of NAT devices.

安全策略配置模块:Security policy configuration module:

配置适当的安全策略,包括身份验证和密钥交换。确保IPsec端点之间的通信是受保护的,并且仅受权用户可以建立安全连接。Configure appropriate security policies, including authentication and key exchange. Ensure communications between IPsec endpoints are protected and only authorized users can establish secure connections.

测试和监控模块:Testing and monitoring modules:

在实际部署之前,进行测试以确保IPsec配置和NAT设备的设置正常工作。定期监控系统以确保安全性和性能。Before actual deployment, conduct testing to ensure that the IPsec configuration and NAT device settings are working properly. Monitor systems regularly to ensure security and performance.

本发明关键在于正确配置IPsec和NAT设备以支持UDP封装,以解决NAT穿越问题,同时确保通信的安全性。这样可以确保交通信息发布系统在面对NAT设备时能够安全、可靠地传输数据。The key to the present invention is to correctly configure IPsec and NAT equipment to support UDP encapsulation to solve the NAT traversal problem while ensuring communication security. This ensures that the traffic information release system can transmit data safely and reliably when facing NAT devices.

具体的,IPsec模块包括:Specifically, IPsec modules include:

选择支持NAT穿越的IPsec实现:确保所选的IPsec实现(通常是IPsecVPN设备或软件)支持NAT穿越。不同的IPsec实现可能有不同的配置选项和支持水平。Choose an IPsec implementation that supports NAT traversal: Make sure the IPsec implementation you choose (usually an IPsecVPN device or software) supports NAT traversal. Different IPsec implementations may have different configuration options and support levels.

配置IPsec协议参数:在IPsec配置中,选择使用UDP封装的ESP(EncapsulatingSecurityPayload)协议,涉及到设置以下参数:Configure IPsec protocol parameters: In the IPsec configuration, select the ESP (EncapsulatingSecurityPayload) protocol using UDP encapsulation, which involves setting the following parameters:

ESP封装模式:选择UDP封装。ESP encapsulation mode: select UDP encapsulation.

UDP端口号:指定用于封装IPsec流量的UDP端口号。通常,常见的UDP端口号为500或4500,但确保与NAT设备的配置一致。UDP port number: Specify the UDP port number used to encapsulate IPsec traffic. Usually, common UDP port numbers are 500 or 4500, but make sure it is consistent with the configuration of the NAT device.

配置其他IPsec参数:除了UDP封装外,还需要配置其他IPsec参数,例如加密算法、身份验证方法、密钥长度等,以确保通信的机密性和完整性。Configure other IPsec parameters: In addition to UDP encapsulation, you also need to configure other IPsec parameters, such as encryption algorithm, authentication method, key length, etc., to ensure the confidentiality and integrity of communication.

定义和管理IPsec安全关联:配置IPsec安全关联,定义通信的安全参数,如预共享密钥或数字证书,这些参数将用于安全地建立IPsec连接。Define and manage IPsec security associations: Configure IPsec security associations and define security parameters for communication, such as pre-shared keys or digital certificates, which will be used to securely establish IPsec connections.

配置IPsec端点:在交通信息发布系统的两个端点上配置IPsec,确保它们使用相同的IPsec配置和参数。Configure IPsec endpoints: Configure IPsec on both endpoints of the traffic information publishing system, ensuring that they use the same IPsec configuration and parameters.

本模块的目标是确保IPsec配置适合NAT穿越,以便IPsec流量可以安全地通过NAT设备。The goal of this module is to ensure that the IPsec configuration is suitable for NAT traversal so that IPsec traffic can safely pass through the NAT device.

具体的,IPsec端点配置模块包括:Specifically, the IPsec endpoint configuration module includes:

ESP封装模式:在IPsec配置中,将ESP封装模式设置为使用UDP封装。这是通过配置IPsec策略的一部分来完成的,对于大多数IPsec设备和软件,将在配置中找到一个选项来指定封装模式。ESP encapsulation mode: In the IPsec configuration, set the ESP encapsulation mode to use UDP encapsulation. This is done as part of the configuration of the IPsec policy, and with most IPsec devices and software, you will find an option in the configuration to specify the encapsulation mode.

UDP端口号:指定UDP端口号,用于封装IPsec流量。通常,UDP端口号为4500(UDP-4500),这是NAT穿越所需的标准端口号。如果需要使用不同的端口号,请确保两个IPsec端点上的配置是一致的,这可以在IPsec配置中指定。UDP port number: Specify the UDP port number used to encapsulate IPsec traffic. Typically, the UDP port number is 4500 (UDP-4500), which is the standard port number required for NAT traversal. If you need to use different port numbers, make sure the configuration on both IPsec endpoints is consistent, this can be specified in the IPsec configuration.

ESP报文尺寸:ESP报文尺寸是每个ESP报文的最大尺寸。确保将ESP报文尺寸配置为适当的值,以适应网络中的最大MTU(最大传输单元)大小。通常,最大MTU大小是1500字节,但在某些情况下可能需要更小的尺寸以避免分段。ESP message size: ESP message size is the maximum size of each ESP message. Ensure that the ESP packet size is configured to an appropriate value to accommodate the maximum MTU (Maximum Transmission Unit) size in the network. Typically, the maximum MTU size is 1500 bytes, but in some cases a smaller size may be required to avoid fragmentation.

本模块的目标是确保IPsec端点配置为适应NAT穿越,以允许IPsec流量正确地封装在UDP数据包中。The goal of this module is to ensure that IPsec endpoints are configured to accommodate NAT traversal to allow IPsec traffic to be correctly encapsulated in UDP packets.

具体的,NAT设备配置模块包括:Specifically, the NAT device configuration module includes:

NAT规则配置:登录到的NAT设备管理界面,找到NAT规则配置部分。通常,需要创建一条NAT规则,以确保UDP封装的IPsec流量正确通过NAT设备。NAT rule configuration: Log in to the NAT device management interface and find the NAT rule configuration section. Typically, a NAT rule needs to be created to ensure that UDP-encapsulated IPsec traffic correctly passes through the NAT device.

UDP端口映射:在NAT规则中,配置UDP端口映射,将UDP端口号映射到正确的内部IPsec端点。确保UDP端口号与IPsec端点的配置相匹配,以便UDP封装的IPsec流量能够正确路由到目标。UDP port mapping: In the NAT rule, configure UDP port mapping to map the UDP port number to the correct internal IPsec endpoint. Ensure that the UDP port number matches the configuration of the IPsec endpoint so that UDP-encapsulated IPsec traffic is routed correctly to the destination.

不更改IPsec报头:关键是确保NAT设备不会更改IPsec报头信息,包括源和目的IP地址。这通常是默认行为,但应该验证并确认NAT设备的配置不会导致这些信息的更改。No changes to IPsec headers: The key is to ensure that the NAT device does not change the IPsec header information, including source and destination IP addresses. This is usually the default behavior, but you should verify that the configuration of the NAT device does not cause this information to change.

启用UDP穿越:某些NAT设备可能需要启用UDP穿越(UDPPassthrough)或NAT-T(NATTraversal)功能,这确保NAT设备能够正确处理UDP封装的IPsec流量。Enable UDP passthrough: Some NAT devices may need to enable the UDP passthrough (UDPPassthrough) or NAT-T (NATTraversal) function, which ensures that the NAT device can correctly handle UDP-encapsulated IPsec traffic.

测试和验证:在完成配置后,进行测试以确保UDP封装的IPsec流量能够通过NAT设备,而不会导致问题,验证IPsec连接是否可以正常建立和传输数据。Test and verify: After completing the configuration, perform tests to ensure that UDP-encapsulated IPsec traffic can pass through the NAT device without causing problems. Verify that the IPsec connection can be established and transfer data normally.

本模块的目标是确保NAT设备在IPsec流量传输过程中不会引发问题。The goal of this module is to ensure that NAT devices do not cause problems during the transmission of IPsec traffic.

具体的,NAT穿越设置模块包括:Specifically, the NAT traversal setting module includes:

查看NAT设备支持:首先,确定的NAT设备是否支持NAT穿越协议,如NAT-T。不同的设备和制造商支持的协议可能有所不同,查阅NAT设备的文档以确定是否支持NAT穿越,并了解如何启用它。Check NAT device support: First, determine whether the NAT device supports NAT traversal protocol, such as NAT-T. Supported protocols may vary between devices and manufacturers, check the documentation for your NAT device to determine whether NAT traversal is supported and to learn how to enable it.

启用NAT穿越:如果的NAT设备支持NAT穿越,前往NAT设备的管理界面,并启用NAT穿越选项。这通常是在NAT或防火墙设置中的一个开关或选项,启用NAT穿越后,NAT设备将能够正确处理IPsec流量。Enable NAT traversal: If your NAT device supports NAT traversal, go to the management interface of the NAT device and enable the NAT traversal option. This is usually a switch or option in the NAT or firewall settings. When NAT traversal is enabled, the NAT device will be able to handle IPsec traffic correctly.

配置NAT穿越参数:在某些情况下,可能需要配置NAT穿越的参数,以适应的网络环境。可能包括设置NAT-T的超时值或其他相关参数,以确保NAT穿越正常工作。Configure NAT traversal parameters: In some cases, you may need to configure NAT traversal parameters to adapt to the network environment. This may include setting the NAT-T timeout value or other related parameters to ensure that NAT traversal works properly.

验证:完成NAT穿越设置后,进行测试以验证IPsec流量是否能够成功穿越NAT设备,确保IPsec连接可以正常建立和传输数据。Verification: After completing the NAT traversal settings, perform a test to verify whether IPsec traffic can successfully traverse the NAT device to ensure that the IPsec connection can be established and data can be transmitted normally.

本模块的目标是确保NAT穿越协议正确工作,使IPsec流量可以穿越NAT设备并正常传输。The goal of this module is to ensure that the NAT traversal protocol works correctly so that IPsec traffic can traverse the NAT device and be transmitted normally.

具体的,安全策略配置模块包括:Specifically, the security policy configuration module includes:

选择身份验证方法:在IPsec配置中,选择适当的身份验证方法,以确保合法用户可以建立连接。身份验证方法可以包括预共享密钥、数字证书、或其他身份验证方式。确保选择的方法适合的安全需求。Select an authentication method: In the IPsec configuration, select an appropriate authentication method to ensure that legitimate users can establish connections. Authentication methods may include pre-shared keys, digital certificates, or other authentication methods. Make sure the method you choose is appropriate for your security needs.

配置IKE参数:配置IKE参数,包括密钥协商阶段(通常有两个阶段:Phase1和Phase2)的参数,如加密算法、哈希算法、Diffie-Hellman组、密钥生命周期等。这些参数将用于安全关联的建立和密钥协商。Configure IKE parameters: Configure IKE parameters, including parameters of the key negotiation phase (usually there are two phases: Phase1 and Phase2), such as encryption algorithm, hash algorithm, Diffie-Hellman group, key life cycle, etc. These parameters will be used for security association establishment and key negotiation.

定义安全关联:创建一个或多个安全关联(SecurityAssociation,SA)配置,定义与对等方的安全通信参数。每个SA将包括IPsec的相关参数,如加密算法、认证算法、密钥等。Define security associations: Create one or more Security Association (SA) configurations to define secure communication parameters with peers. Each SA will include IPsec-related parameters, such as encryption algorithm, authentication algorithm, key, etc.

分配安全策略:将安全关联分配给IPsec端点,以确保它们共享相同的安全策略。确保配置的参数与对等方的配置一致,以便建立和维护安全连接。Assign security policy: Assign security associations to IPsec endpoints to ensure they share the same security policy. Ensure that the configured parameters are consistent with the peer's configuration in order to establish and maintain a secure connection.

密钥协商:当两个IPsec端点尝试建立连接时,它们将执行IKE协议的密钥协商,以生成用于加密和认证数据的密钥。确保密钥协商能够成功完成。Key Agreement: When two IPsec endpoints attempt to establish a connection, they perform key negotiation of the IKE protocol to generate keys used to encrypt and authenticate data. Ensure that key negotiation can complete successfully.

监控和审计:定期监控安全连接的性能和活动,以确保它们仍然受到保护。此外,配置审计日志,以记录关键安全事件。Monitoring and auditing: Regularly monitor the performance and activity of secure connections to ensure they remain protected. Additionally, configure audit logs to record critical security events.

本模块的目标是确保IPsec端点之间的通信是受保护的,并且只有合法用户可以建立连接。安全策略的配置需要考虑加密、认证和密钥管理等方面,以维护通信的机密性和完整性。The goal of this module is to ensure that communications between IPsec endpoints are protected and only legitimate users can establish connections. The configuration of security policies needs to consider aspects such as encryption, authentication, and key management to maintain the confidentiality and integrity of communications.

具体的,测试和监控模块包括:Specifically, the testing and monitoring modules include:

初步测试:在实际部署之前,执行初步测试,包括以下方面:Preliminary testing: Before actual deployment, perform preliminary testing, including the following aspects:

建立IPsec连接:确保IPsec连接可以成功建立,并数据可以在两个端点之间传输。Establish IPsec connection: Ensure that the IPsec connection can be successfully established and data can be transferred between the two endpoints.

NAT穿越测试:验证NAT穿越是否正常工作,IPsec流量能够通过NAT设备。NAT traversal test: Verify that NAT traversal is working properly and IPsec traffic can pass through the NAT device.

安全策略测试:确保安全策略配置正确,只有合法用户能够建立连接。Security policy test: Ensure that the security policy is configured correctly and only legitimate users can establish connections.

数据传输测试:传输数据并验证数据的完整性和机密性。Data transfer testing: Transfer data and verify data integrity and confidentiality.

性能测试:进行性能测试以评估IPsec连接的性能。测量连接的带宽、延迟和吞吐量,确保它们满足的需求。Performance Testing: Conduct performance testing to evaluate the performance of IPsec connections. Measure the bandwidth, latency, and throughput of your connections to ensure they meet your needs.

监控设置:配置系统监控,以跟踪连接的活动和性能。这可能包括配置监控工具或系统日志,以记录关键事件和统计信息。Monitoring settings: Configure system monitoring to track connection activity and performance. This may include configuring monitoring tools or system logs to record key events and statistics.

定期监控:定期检查系统的性能和安全状况。监控连接的稳定性和性能,并查看安全审计日志以检测潜在的安全问题。Regular monitoring: Regularly check the performance and security status of the system. Monitor connection stability and performance, and review security audit logs to detect potential security issues.

更新和维护:在系统运行过程中,根据监控结果,对配置和参数进行必要的更新和维护。确保安全策略、密钥和证书仍然有效,并符合最佳安全实践。Update and maintenance: During system operation, necessary updates and maintenance are performed on configurations and parameters based on monitoring results. Ensure security policies, keys, and certificates are still valid and comply with best security practices.

事件响应:设置事件响应计划,以处理安全事件和问题。当检测到异常或安全事件时,立即采取适当的措施。Incident Response: Set up an incident response plan to handle security incidents and issues. When an anomaly or security incident is detected, take appropriate action immediately.

本模块的目标是确保系统在实际运行中正常工作,安全性得到维护,性能达到要求。测试和监控是持续的过程,以保障系统的安全性和性能。The goal of this module is to ensure that the system works properly in actual operation, security is maintained, and performance meets requirements. Testing and monitoring are ongoing processes to ensure system security and performance.

最后应说明的是:以上所述仅为本发明的优选实施例而已,并不用于限制本发明,尽管参照前述实施例对本发明进行了详细的说明,对于本领域的技术人员来说,其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行同替换。凡在本发明的精神和原则之内,所作的任何修改、同替换、改进,均应包含在本发明权利要求保护的范围之内。Finally, it should be noted that the above are only preferred embodiments of the present invention and are not intended to limit the present invention. Although the present invention has been described in detail with reference to the foregoing embodiments, for those skilled in the art, it is still The technical solutions described in the foregoing embodiments may be modified, or some of the technical features may be replaced. Any modifications, substitutions, and improvements made within the spirit and principles of the present invention shall be included in the scope of the claims of the present invention.

Claims (7)

1.一种针对交通信息发布系统的安全加密防护系统,其特征在于,包括:1. A security encryption protection system for traffic information release system, which is characterized by including: IPsec模块:在IPsec中使用UDP封装以允许IPsec流量通过NAT设备;IPsec module: Use UDP encapsulation in IPsec to allow IPsec traffic to pass through NAT devices; IPsec端点配置模块:配置IPsec端点以使用UDP封装;IPsec endpoint configuration module: Configure IPsec endpoints to use UDP encapsulation; NAT设备配置模块:配置NAT设备以支持UDP封装的IPsec流量;NAT device configuration module: Configure the NAT device to support UDP-encapsulated IPsec traffic; NAT穿越设置模块:启用NAT穿越协议,以确保IPsec流量可以穿越NAT设备,NAT穿越协议使IPsec流量能够处理并绕过NAT设备的限制;NAT traversal setting module: Enable NAT traversal protocol to ensure that IPsec traffic can traverse NAT devices. NAT traversal protocol enables IPsec traffic to process and bypass the restrictions of NAT devices; 安全策略配置模块:配置安全策略,包括身份验证和密钥交换,确保IPsec端点之间的通信是受保护的,并且仅受权用户可以建立安全连接;Security policy configuration module: Configure security policies, including authentication and key exchange, to ensure that communications between IPsec endpoints are protected and only authorized users can establish secure connections; 测试和监控模块:在实际部署之前,进行测试以确保IPsec配置和NAT设备的设置正常工作。Testing and Monitoring Module: Before actual deployment, perform testing to ensure that the IPsec configuration and NAT device settings are working properly. 2.根据权利要求1所述的一种针对交通信息发布系统的安全加密防护系统,其特征在于,所述IPsec模块包括:2. A security encryption protection system for traffic information release system according to claim 1, characterized in that the IPsec module includes: 确保所选的IPsec实现支持NAT穿越;Make sure the selected IPsec implementation supports NAT traversal; 在IPsec配置中,选择使用UDP封装的ESP协议,设置以下参数:In the IPsec configuration, select the ESP protocol using UDP encapsulation and set the following parameters: ESP封装模式:选择UDP封装;ESP encapsulation mode: select UDP encapsulation; UDP端口号:指定用于封装IPsec流量的UDP端口号;UDP port number: Specify the UDP port number used to encapsulate IPsec traffic; 配置其他IPsec参数:除了UDP封装外,还需要配置其他IPsec参数,以确保通信的机密性和完整性;Configure other IPsec parameters: In addition to UDP encapsulation, other IPsec parameters need to be configured to ensure the confidentiality and integrity of communication; 定义和管理IPsec安全关联:配置IPsec安全关联,定义通信的安全参数;Define and manage IPsec security associations: configure IPsec security associations and define security parameters for communication; 配置IPsec端点:在交通信息发布系统的两个端点上配置IPsec,确保它们使用相同的IPsec配置和参数。Configure IPsec endpoints: Configure IPsec on both endpoints of the traffic information publishing system, ensuring that they use the same IPsec configuration and parameters. 3.根据权利要求2所述的一种针对交通信息发布系统的安全加密防护系统,其特征在于,所述IPsec端点配置模块包括:3. A security encryption protection system for traffic information release system according to claim 2, characterized in that the IPsec endpoint configuration module includes: 在IPsec配置中,将ESP封装模式设置为使用UDP封装;In the IPsec configuration, set the ESP encapsulation mode to use UDP encapsulation; 指定UDP端口号,用于封装IPsec流量;Specify the UDP port number for encapsulating IPsec traffic; 确保将ESP报文尺寸配置为适当的值,以适应网络中的最大MTU大小。Make sure to configure the ESP packet size to an appropriate value to accommodate the maximum MTU size in the network. 4.根据权利要求3所述的一种针对交通信息发布系统的安全加密防护系统,其特征在于,所述NAT设备配置模块包括:4. A security encryption protection system for traffic information release system according to claim 3, characterized in that the NAT device configuration module includes: 登录到NAT设备管理界面,找到NAT规则配置部分;Log in to the NAT device management interface and find the NAT rule configuration section; 在NAT规则中,配置UDP端口映射,将UDP端口号映射到正确的内部IPsec端点,确保UDP端口号与IPsec端点的配置相匹配,以便UDP封装的IPsec流量能够正确路由到目标;In the NAT rule, configure UDP port mapping to map the UDP port number to the correct internal IPsec endpoint, ensuring that the UDP port number matches the configuration of the IPsec endpoint so that UDP-encapsulated IPsec traffic can be correctly routed to the destination; 确保NAT设备不会更改IPsec报头信息,包括源和目的IP地址;Ensure that NAT devices do not change IPsec header information, including source and destination IP addresses; 启用UDP穿越确保NAT设备能够正确处理UDP封装的IPsec流量;Enabling UDP traversal ensures that the NAT device can correctly handle UDP-encapsulated IPsec traffic; 在完成配置后,进行测试以确保UDP封装的IPsec流量能够通过NAT设备,验证IPsec连接是否可以正常建立和传输数据。After completing the configuration, perform tests to ensure that UDP-encapsulated IPsec traffic can pass through the NAT device and verify that the IPsec connection can be established and transmit data normally. 5.根据权利要求4所述的一种针对交通信息发布系统的安全加密防护系统,其特征在于,所述NAT穿越设置模块包括:5. A security encryption protection system for traffic information release system according to claim 4, characterized in that the NAT traversal setting module includes: 启用NAT穿越;Enable NAT traversal; 配置NAT穿越参数,以适应的网络环境;Configure NAT traversal parameters to adapt to the network environment; 完成NAT穿越设置后,进行测试以验证IPsec流量是否能够成功穿越NAT设备,确保IPsec连接可以正常建立和传输数据。After completing the NAT traversal settings, perform a test to verify whether IPsec traffic can successfully traverse the NAT device and ensure that the IPsec connection can be established and data can be transmitted normally. 6.根据权利要求5所述的一种针对交通信息发布系统的安全加密防护系统,其特征在于,所述安全策略配置模块包括:6. A security encryption protection system for traffic information release system according to claim 5, characterized in that the security policy configuration module includes: 在IPsec配置中,选择适当的身份验证方法,以确保合法用户可以建立连接;In the IPsec configuration, select an appropriate authentication method to ensure that legitimate users can establish connections; 配置IKE参数,包括密钥协商阶段的参数,参数用于安全关联的建立和密钥协商;Configure IKE parameters, including parameters in the key negotiation phase, which are used for the establishment of security associations and key negotiation; 创建一个或多个安全关联配置,定义与对等方的安全通信参数;Create one or more security association configurations that define secure communication parameters with peers; 将安全关联分配给IPsec端点,以确保它们共享相同的安全策略,确保配置的参数与对等方的配置一致,以便建立和维护安全连接;Assign security associations to IPsec endpoints to ensure that they share the same security policy and that configured parameters are consistent with those of the peer in order to establish and maintain secure connections; 当两个IPsec端点尝试建立连接时,执行IKE协议的密钥协商,以生成用于加密和认证数据的密钥;When two IPsec endpoints attempt to establish a connection, key negotiation of the IKE protocol is performed to generate keys used to encrypt and authenticate data; 定期监控安全连接的性能和活动,以确保它们仍然受到保护。Regularly monitor the performance and activity of secure connections to ensure they remain protected. 7.根据权利要求6所述的一种针对交通信息发布系统的安全加密防护系统,其特征在于,所述测试和监控模块包括:7. A security encryption protection system for traffic information release system according to claim 6, characterized in that the testing and monitoring module includes: 在实际部署之前,执行初步测试,包括以下方面:Before actual deployment, perform preliminary testing, including the following: 建立IPsec连接:确保IPsec连接可以成功建立,并数据可以在两个端点之间传输;Establish IPsec connection: Ensure that the IPsec connection can be successfully established and data can be transferred between the two endpoints; NAT穿越测试:验证NAT穿越是否正常工作,IPsec流量能够通过NAT设备;NAT traversal test: Verify that NAT traversal is working properly and IPsec traffic can pass through the NAT device; 安全策略测试:确保安全策略配置正确,只有合法用户能够建立连接;Security policy testing: Ensure that the security policy is configured correctly and only legitimate users can establish connections; 数据传输测试:传输数据并验证数据的完整性和机密性;Data transmission testing: transmit data and verify data integrity and confidentiality; 进行性能测试以评估IPsec连接的性能,测量连接的带宽、延迟和吞吐量;Conduct performance testing to evaluate the performance of IPsec connections, measuring the bandwidth, latency and throughput of the connection; 配置系统监控,以跟踪连接的活动和性能;Configure system monitoring to track connection activity and performance; 定期检查系统的性能和安全状况,监控连接的稳定性和性能,并查看安全审计日志以检测潜在的安全问题;Regularly check the performance and security status of the system, monitor the stability and performance of connections, and review security audit logs to detect potential security issues; 在系统运行过程中,根据监控结果,对配置和参数进行更新和维护,确保安全策略、密钥和证书仍然有效,并符合最佳安全实践;During system operation, update and maintain configurations and parameters based on monitoring results to ensure that security policies, keys and certificates are still valid and comply with best security practices; 设置事件响应计划,以处理安全事件和问题,当检测到异常或安全事件时,采取适当的措施。Set up an incident response plan to handle security incidents and issues and take appropriate action when anomalies or security incidents are detected.
CN202311337067.XA 2023-10-16 2023-10-16 Safety encryption protection system for traffic information release system Pending CN117134991A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311337067.XA CN117134991A (en) 2023-10-16 2023-10-16 Safety encryption protection system for traffic information release system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311337067.XA CN117134991A (en) 2023-10-16 2023-10-16 Safety encryption protection system for traffic information release system

Publications (1)

Publication Number Publication Date
CN117134991A true CN117134991A (en) 2023-11-28

Family

ID=88856624

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311337067.XA Pending CN117134991A (en) 2023-10-16 2023-10-16 Safety encryption protection system for traffic information release system

Country Status (1)

Country Link
CN (1) CN117134991A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1855924A (en) * 2005-04-27 2006-11-01 华为技术有限公司 Method for network layer safety text going through address changing device
CN101217435A (en) * 2008-01-16 2008-07-09 中兴通讯股份有限公司 L2TP over IPSEC remote access method and device
CN101222412A (en) * 2008-01-23 2008-07-16 华为技术有限公司 Network address translation traversal method and system
US8059641B1 (en) * 2006-07-20 2011-11-15 Avaya Inc. Encapsulation method discovery protocol for network address translation gateway traversal
CN111614796A (en) * 2020-04-30 2020-09-01 网络通信与安全紫金山实验室 Method and device for configuring IPsec tunnel to pass through NAT by using manual secret key

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1855924A (en) * 2005-04-27 2006-11-01 华为技术有限公司 Method for network layer safety text going through address changing device
US8059641B1 (en) * 2006-07-20 2011-11-15 Avaya Inc. Encapsulation method discovery protocol for network address translation gateway traversal
CN101217435A (en) * 2008-01-16 2008-07-09 中兴通讯股份有限公司 L2TP over IPSEC remote access method and device
CN101222412A (en) * 2008-01-23 2008-07-16 华为技术有限公司 Network address translation traversal method and system
CN111614796A (en) * 2020-04-30 2020-09-01 网络通信与安全紫金山实验室 Method and device for configuring IPsec tunnel to pass through NAT by using manual secret key

Similar Documents

Publication Publication Date Title
US11134064B2 (en) Network guard unit for industrial embedded system and guard method
US20230065060A1 (en) System and method for a multi system trust chain
US7690040B2 (en) Method for network traffic mirroring with data privacy
US7188365B2 (en) Method and system for securely scanning network traffic
CN102347870B (en) A kind of flow rate security detection method, equipment and system
US7386889B2 (en) System and method for intrusion prevention in a communications network
WO2007006007A2 (en) Using non 5-tuple information with ipsec
WO2015131609A1 (en) Method for implementing l2tp over ipsec access
US20070086462A1 (en) Dynamic tunnel construction method for securely accessing to a private LAN and apparatus therefor
CN114050920B (en) Transparent network encryption system implementation method based on FPGA
AU2003294304B2 (en) Systems and apparatuses using identification data in network communication
CN110892695A (en) Method, apparatus and computer program product for checking connection parameters of a password-protected communication connection during connection establishment
CN211352206U (en) IPSec VPN cryptographic machine based on quantum key distribution
CN114567493A (en) P2P flow screening and forwarding system based on FPGA
CN118784361A (en) A data transmission method and system based on encrypted communication in a business operating system
CN200962603Y (en) A Trusted Border Security Gateway
CN117134991A (en) Safety encryption protection system for traffic information release system
CN116260580A (en) IPSec VPN connection method and system based on quantum key
CN111917800B (en) External authorization system and method based on protocol
WO2024066059A1 (en) Industrial internet security system and method based on sdp and edge computing
Cisco Configuring Network Data Encryption with Router Authentication
Есенжолов et al. Implementation of traffic protection based on ipsec vpn technology and network modeling on ensp software environment
CN113473470A (en) Charging pile networking communication system based on 5G and bidirectional communication method
Ahmed et al. Architecture based on tor network for securing the communication of northbound interface in sdn
CN114465755B (en) IPSec transmission abnormality-based detection method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20231128

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载