Hewlett-Packard Company Virtual Private Networking Concepts Guide
5-1
Firewalls and Tunnels
5
Firewall and Tunnels Overview
Firewall and Tunnels Overview
Firewall and Tunnels Overview
Firewall and Tunnels Overview
Firewalls and tunnels are the core parts of a network that control
the flow of data packets in and out of a trusted and untrusted
network.
Firewalls
Firewalls
Firewalls
Firewalls
Firewalls control access between a red (trusted) network and a
black (untrusted) network. The black (untrusted) network is
often the Internet. A VPN device can act like a firewall that can
be configured to contain rules. Firewall rules determine which
packets can pass through the gateway between the trusted and
untrusted network.
Using a firewall around a network helps to protect that network
from unwanted data packets entering or leaving the network, but
it has some fundamental flaws. First, the data packets can be
captured as they move through the firewall connecting the
networks. Data could be extracted from the packets or a new
packet could take the place of the original packet. All a hacker
needs to do is replace the original packet with a new packet to
gain access to the destination network.
Tunnels
Tunnels
Tunnels
Tunnels
The term tunnel, when used in the context of a network and
firewall solution, can be explained by the following:
A tunnel acts as a means of transport for data packets. In most
cases, a tunnel encrypts the data packets, making them unusable
should they be intercepted by an unintended user and hackers. A
tunnel also transports the packets to their destination and
decrypts them, providing an overall secure means of
transportation.
Related
Related
Related
Related
Information
Information
Information
Information
Firewall Functions (page 5-2)
Tunnel Types (page 5-8)
Tunnel Modes (page 5-20)
Tunnel Termination and Firewall Rules (page 5-31)