![AVM FRITZ!Box 6360 Cable Installation, Configuration And Operation Download Page 131](http://html.mh-extra.com/html/avm/fritz-box-6360-cable/fritz-box-6360-cable_installation-configuration-and-operation_3032858131.webp)
Security through a VPN
131
The terminals of the tunnels can be individual computers or
entire networks. For instance, telecommuters or field staff can
connect to the company network via VPN. The local network
at a branch office can also be connected to the local network
of company headquarters via VPN. Both of the locations se-
curely connected over VPN must have an Internet connection
at their disposal.
5.2
Security through a VPN
A VPN fulfills the following security requirements for data
transmission:
•
authenticity
•
confidentiality
•
integrity
Authenticity
Authenticity ensures that no unauthorized users can access
the local network via VPN.
It also makes sure that incoming data actually come from the
registered party and not from another source.
Confidentiality
Confidentiality requires the nondisclosure of data. Confiden-
tiality can be guaranteed by encrypting the data. Encryption
means that unauthorized third parties cannot obtain any
knowledge about the transmitted data.
Tunnel
Tunnel
Local network A
Local network B
Internet