186
C
HAPTER
14: N
ETWORKING
C
ONCEPTS
■
Linking two or more Private Networks Together
VPN is the perfect way to connect branch offices and business
partners to the primary business. Using VPN over the Internet, instead
of leased site-site lines, offers significant cost savings and improved
performance.
■
Using the IRE VPN Client for Secure Remote Management
Using the included IRE VPN client for Windows, a secure, encrypted
tunnel may be created that allows the administrator to remotely
manage the Firewall over the Internet.
■
Accessing Machines Using Private Addressing behind NAT
When NAT (Network Address Translation) is enabled, remote users are
not able to access hosts on the LAN unless the host is designated a
Public LAN Server for that specific protocol. Since the VPN Tunnel
terminates inside the LAN, remote users will be able to access all
computers that use private IP addresses on the LAN.
Basic VPN Terms and
Concepts
The following explains the most common terms and expressions used in
VPN
■
VPN Tunnel
Tunnelling is the encapsulation of point-point transmission inside IP
packets. A VPN Tunnel is a term that is used to describe a connection
between two or more private nodes or LANs over a public network,
typically the Internet. Encryption is often used to maintain the
confidentiality of private data when travelling over the Internet.
■
Encryption
Encryption is a mathematical operation that transforms data from
“clear text” (something that a human or a program can interpret) to
“cipher text” (something that cannot be interpreted). Usually the
mathematical operation requires that an alphanumeric “key” be
supplied along with the clear text. The key and clear text are
processed by the encryption operation which leads to the data
scrambling that makes encryption secure. Decryption is the opposite
of encryption: it is the mathematical operation that transforms cipher
text to clear text. Decryption also requires a key.
■
Key
A key is an alphanumeric string that is used by the encryption
operation to transform clear text into cipher text. Keys used in VPN
DUA1611-0AAA02.book Page 186 Thursday, August 2, 2001 4:01 PM
Summary of Contents for 3C16111 - SuperStack 3 Firewall Web Site Filter
Page 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Page 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Page 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Page 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Page 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Page 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Page 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Page 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Page 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...