![](https://csdnimg.cn/release/download_crawler_static/88313906/bg3.jpg)
目录
第 1 章 绪论......................................................................................................................................1
1.1 研究的背景和意义............................................................................................................1
1.1.1 国内外背景............................................................................................................1
1.1.2 探索意义................................................................................................................2
1.2 虚拟云部署的目的和原则................................................................................................3
1.2.1 实现目的................................................................................................................3
1.2.2 遵守原则................................................................................................................3
1.3 论文的主体结构、研究方法............................................................................................3
1.3.1 主体结构................................................................................................................3
1.3.2 研究方法................................................................................................................4
第 2 章 需求分析..............................................................................................................................5
2.1 网络安全行业的需求........................................................................................................5
2.2 企业的需求........................................................................................................................6
2.3 职业人员的需求................................................................................................................6
第 3 章 相关技术和工具..................................................................................................................8
3.1 应用中的相关技术............................................................................................................8
3.1.1 对等式网络(peer-to-peer) ................................................................................8
3.1.2 虚拟专用网络(Virtual Private Network).........................................................8
3.1.3 云服务器 ECS(Elastic Compute Service)........................................................8
3.2 需要使用的工具................................................................................................................9
3.2.1 云翼计划-ECS 服务器..........................................................................................9
3.2.2 树莓派 (Raspberry Pi).....................................................................................9
3.2.3 N2N.........................................................................................................................9
3.2.4 Network Mapper ...................................................................................................10
3.2.5 AVWS 漏洞扫描器(Web Vulnerability Scanner) ...............................................10
第 4 章 设计实现............................................................................................................................11
4.1 总体的设计方案..............................................................................................................11
4.1.1 异地组建虚拟局域网方案..................................................................................11
4.1.2 虚拟局域网内的 IP 分配....................................................................................12
4.2 实现流程展示..................................................................................................................12
4.2.1 前期准备..............................................................................................................12
4.2.1.1 ECS 云服务器准备 .............................................................................................12
4.2.1.2 树莓派 3b 准备...................................................................................................15
4.2.1.3 下载安装 N2N....................................................................................................16
4.2.2 虚拟局域网搭建..................................................................................................17
4.2.3 内网接入..............................................................................................................20
4.2.4 在 S-Node 部署 Nmap 扫描器...........................................................................21
4.2.5 在 S-Node 部署 AWVS 扫描器.........................................................................21
第 5 章 测试及实际应用................................................................................................................23
5.1 测试效果..........................................................................................................................23
5.1.1 测试虚拟局域网内的连接..................................................................................23
5.1.2 测试从 EdgeB 是否能与 EdgeA 内网中的服务器进行通信............................24