Advanced Search
    Wang Li, Xu Mingwei, and Xu Ke. On the Deployment Approach of IPSec and IP Filter in Routers[J]. Journal of Computer Research and Development, 2006, 43(3): 375-380.
    Citation: Wang Li, Xu Mingwei, and Xu Ke. On the Deployment Approach of IPSec and IP Filter in Routers[J]. Journal of Computer Research and Development, 2006, 43(3): 375-380.

    On the Deployment Approach of IPSec and IP Filter in Routers

    More Information
    • Published Date: March 14, 2006
    • IPSec and IP Filter are among the most important security modules of IPv6 routers. Similar to the function of IP Filter, the security-association query engine of IPSec also needs filtering and matching the IP packages. The IP packages flowing inside the router could be filtered by IP Filter and IPSec for more than once. Thus, the method of deployment between the two modules will have direct influence on the processing performance of IP packages. In this work, the inter-relationship between the two security modules is given in a perspective of router global security. Moreover, a novel deployment approach is proposed. Compared with the open-source IPv6 protocol stack KAME, the improved processing performance of IPSec is obtained and the negative influence of IP Filter on the IPSec is reduced. Meanwhile, the duplicated IP package filtering within the routers is reduced to improve the processing performance of IP package.
    • Related Articles

      [1]Xie Qin, Zhang Qinghua, Wang Guoyin. An Adaptive Three-way Spam Filter with Similarity Measure[J]. Journal of Computer Research and Development, 2019, 56(11): 2410-2423. DOI: 10.7544/issn1000-1239.2019.20180793
      [2]Song Jinfeng, Wen Lijie, Wang Jianmin. A Similarity Measure for Process Models Based on Task Occurrence Relations[J]. Journal of Computer Research and Development, 2017, 54(4): 832-843. DOI: 10.7544/issn1000-1239.2017.20151176
      [3]Zhao Yongwei, Zhou Yuan, Li Bicheng. Object Retrieval Based on Enhanced Dictionary and Spatially-Constrained Similarity Measurement[J]. Journal of Computer Research and Development, 2016, 53(5): 1043-1052. DOI: 10.7544/issn1000-1239.2016.20150070
      [4]Wang Shaopeng, Wen Yingyou, Zhao Hong. Similarity Query Processing Algorithm over Data Stream Based on LCSS[J]. Journal of Computer Research and Development, 2015, 52(9): 1976-1991. DOI: 10.7544/issn1000-1239.2015.20140479
      [5]Xiao Yu and Yu Jian. A Weighted Self Adaptive Similarity Measure[J]. Journal of Computer Research and Development, 2013, 50(9): 1876-1882.
      [6]Shen Qingni, Du Hong, Wen Han, Qing Sihan. A Data Sealing Approach Based on Integrity Measurement Architecture[J]. Journal of Computer Research and Development, 2012, 49(1): 210-216.
      [7]Zhu Yangyong, Dai Dongbo, and Xiong Yun. A Survey of the Research on Similarity Query Technique of Sequence Data[J]. Journal of Computer Research and Development, 2010, 47(2): 264-276.
      [8]Xing Chunxiao, Gao Fengrong, Zhan Sinan, Zhou Lizhu. A Collaborative Filtering Recommendation Algorithm Incorporated with User Interest Change[J]. Journal of Computer Research and Development, 2007, 44(2): 296-301.
      [9]Liu Bing, Yan Heping, Duan Jiangjiao, Wang Wei, and Shi Baile. A Bottom-Up Distance-Based Index Tree for Metric Space[J]. Journal of Computer Research and Development, 2006, 43(9): 1651-1657.
      [10]Xiu Yu, Wang Shitong, Wu Xisheng, Hu Dewen. The Directional Similarity-Based Clustering Method DSCM[J]. Journal of Computer Research and Development, 2006, 43(8): 1425-1431.

    Catalog

      Article views (555) PDF downloads (450) Cited by()

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return