C H A P T E R
6-1
VPN 3002 Hardware Client Reference
OL-1893-01
6
Tunneling
Tunneling is the heart of virtual private networking. Tunnels make it possible to use a public TCP/IP
network, such as the Internet, to create secure connections between remote users and a private corporate
network.
The secure connection is called a tunnel, and the VPN 3002 uses the IPSec tunneling protocol to:
•
Negotiate tunnel parameters.
•
Establish tunnels.
•
Authenticate users and data.
•
Manage security keys.
•
Encrypt and decrypt data.
•
Manage data transfer across the tunnel.
•
Manage data transfer inbound and outbound as a tunnel endpoint.
The VPN 3002 functions as a bidirectional tunnel endpoint:
•
It can receive plain packets from the private network, encapsulate them, create a tunnel, and send
them to the other end of the tunnel where they are unencapsulated and sent to their final destination
•
It can receive encapsulated packets from the public network, unencapsulate them, and send them to
their final destination on the private network.
This section explains how to configure the IPSec tunneling protocol.
Summary of Contents for VPN 3002 Hardware Client Manager
Page 8: ...Contents viii VPN 3000 Series Concentrator Reference Volume I Configuration 78 13782 01 ...
Page 16: ...xvi VPN 3002 Hardware Client Reference OL 1893 01 Preface Obtaining technical assistance ...
Page 46: ...2 2 VPN 3002 Hardware Client Reference OL 1893 01 Chapter 2 Configuration Configuration ...
Page 282: ...Index IN 12 VPN 3002 Hardware Client Reference OL 1893 01 ...