![background image](http://html.mh-extra.com/html/zyxel-communications/vantage-cnm-2-0/vantage-cnm-2-0_user-manual_945619145.webp)
Vantage CNM 2.0 User’s Guide
Chapter 11 Configuration > VPN
148
C
H A P T E R
11
Configuration > VPN
This chapter shows you how to configure VPNs using Vantage.
11.1 VPN Overview
A VPN (Virtual Private Network) provides secure communications between sites without the
expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption,
authentication, access control and auditing technologies/services used to transport traffic over
the Internet or any insecure network that uses the TCP/IP protocol suite for communication.
11.1.1 IPSec
Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible solutions for
secure data communications across a public network like the Internet. IPSec is built around a
number of standardized cryptographic techniques to provide confidentiality, data integrity and
authentication at the IP layer.
11.1.2 Security Association
A Security Association (SA) is a contract between two parties indicating what security
parameters, such as keys and algorithms they will use.
11.1.3 Encryption
Encryption is a mathematical operation that transforms data from "plaintext" (readable) to
"ciphertext" (scrambled text) using a "key". The key and clear text are processed by the
encryption operation, which leads to the data scrambling that makes encryption secure.
Decryption is the opposite of encryption: it is a mathematical operation that transforms
ciphertext to plaintext. Decryption also requires a key.
11.1.4 Data Confidentiality
The IPSec sender can encrypt packets before transmitting them across a network.
11.1.5 Data Integrity
The IPSec receiver can validate packets sent by the IPSec sender to ensure that the data has not
been altered during transmission.
Summary of Contents for VANTAGE CNM 2.0 -
Page 30: ...Vantage CNM 2 0 User s Guide 33 Chapter 1 Introducing Vantage ...
Page 40: ...Vantage CNM 2 0 User s Guide 43 Chapter 2 GUI Introduction ...
Page 66: ...Vantage CNM 2 0 User s Guide 69 Chapter 4 Configuration Select Device BB General ...
Page 78: ...Vantage CNM 2 0 User s Guide 81 Chapter 5 Configuration LAN ...
Page 96: ...Vantage CNM 2 0 User s Guide 99 Chapter 7 Configuration DMZ ...
Page 126: ...Vantage CNM 2 0 User s Guide 129 Chapter 8 Configuration WAN ...
Page 140: ...Vantage CNM 2 0 User s Guide 143 Chapter 9 Configuration NAT ...
Page 144: ...Vantage CNM 2 0 User s Guide 147 Chapter 10 Configuration Static Route ...
Page 162: ...Vantage CNM 2 0 User s Guide 165 Chapter 11 Configuration VPN ...
Page 182: ...Vantage CNM 2 0 User s Guide 185 Chapter 12 Configuration Firewall ...
Page 188: ...Vantage CNM 2 0 User s Guide 191 Chapter 13 Configuration Device Log ...
Page 236: ...Vantage CNM 2 0 User s Guide 239 Chapter 18 Other System Screens ...
Page 239: ...Vantage CNM 2 0 User s Guide Chapter 19 Monitor Alarms 242 Figure 132 Monitor Current Alarms ...
Page 242: ...Vantage CNM 2 0 User s Guide 245 Chapter 19 Monitor Alarms ...
Page 248: ...Vantage CNM 2 0 User s Guide 251 Chapter 20 Other Monitor Screens ...
Page 254: ...Vantage CNM 2 0 User s Guide 257 Figure 151 WFTPD Pro Log On ...
Page 266: ...Vantage CNM 2 0 User s Guide 269 ...
Page 274: ...Vantage CNM 2 0 User s Guide 277 ...
Page 286: ...Vantage CNM 2 0 User s Guide 289 ...
Page 288: ...Vantage CNM 2 0 User s Guide 291 ...
Page 291: ...Vantage CNM 2 0 User s Guide 294 Figure 181 ESS Provides Campus Wide Coverage ...
Page 292: ...Vantage CNM 2 0 User s Guide 295 ...
Page 312: ...Vantage CNM 2 0 User s Guide 315 ...