
186
C
HAPTER
14: N
ETWORKING
C
ONCEPTS
■
Linking two or more Private Networks Together
VPN is the perfect way to connect branch offices and business
partners to the primary business. Using VPN over the Internet, instead
of leased site-site lines, offers significant cost savings and improved
performance.
■
Using the IRE VPN Client for Secure Remote Management
Using the included IRE VPN client for Windows, a secure, encrypted
tunnel may be created that allows the administrator to remotely
manage the Firewall over the Internet.
■
Accessing Machines Using Private Addressing behind NAT
When NAT (Network Address Translation) is enabled, remote users are
not able to access hosts on the LAN unless the host is designated a
Public LAN Server for that specific protocol. Since the VPN Tunnel
terminates inside the LAN, remote users will be able to access all
computers that use private IP addresses on the LAN.
Basic VPN Terms and
Concepts
The following explains the most common terms and expressions used in
VPN
■
VPN Tunnel
Tunnelling is the encapsulation of point-point transmission inside IP
packets. A VPN Tunnel is a term that is used to describe a connection
between two or more private nodes or LANs over a public network,
typically the Internet. Encryption is often used to maintain the
confidentiality of private data when travelling over the Internet.
■
Encryption
Encryption is a mathematical operation that transforms data from
“clear text” (something that a human or a program can interpret) to
“cipher text” (something that cannot be interpreted). Usually the
mathematical operation requires that an alphanumeric “key” be
supplied along with the clear text. The key and clear text are
processed by the encryption operation which leads to the data
scrambling that makes encryption secure. Decryption is the opposite
of encryption: it is the mathematical operation that transforms cipher
text to clear text. Decryption also requires a key.
■
Key
A key is an alphanumeric string that is used by the encryption
operation to transform clear text into cipher text. Keys used in VPN
DUA1611-0AAA02.book Page 186 Thursday, August 2, 2001 4:01 PM
Содержание SUPERSTACK 3CR16110-95
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM...