C H A P T E R
10
VPN
A Virtual Private Network (VPN) is used to establish an encrypted connection over a less secure network.
VPN ensures the appropriate level of security to the connected systems when the underlying network
infrastructure alone cannot provide it. A tunnel is established as a private network that can send data securely
by using industry-standard encryption and authentication techniques to secure the data sent.
A secure virtual private network (VPN) connection between two endpoints is known as an IP tunnel. The
tunnel is created by an encapsulation technique, which encapsulates the data inside a known protocol (IP) that
is agreed upon by the two end points. The tunnel creates a virtual circuit-like between the two endpoints and
makes the connection appear like a dedicated connection even though it spans over the Internet infrastructure.
A remote-access VPN usually relies on either IPSec or SSL to secure the connection. VPNs provide Layer 2
access to the target network; these require a tunneling protocol such as PPTP or L2TP running across the base
IPSec connection. The IPSec VPN supports site-to-site VPN for a gateway-to-gateway tunnel and
client-to-server VPN for host-to-gateway tunnel. For example, a user can configure a VPN tunnel at a branch-site
to connect to the router at corporate-site, so that the branch-site can securely access corporate network. The
client to server VPN is useful when connecting from Laptop/PC from home to a corporate network through
VPN server.
This section describes the device's VPN features and contains the following topics:
•
•
•
•
•
•
•
Resource Allocation, on page 102
VPN Setup Wizard
A Virtual Private Network (VPN) is used to establish an encrypted connection over a less secure network.
VPN ensures the appropriate level of security to the connected systems when the underlying network
infrastructure alone cannot provide it. A tunnel is established as a private network that can send data securely
by using industry-standard encryption and authentication techniques to secure the data sent. A remote-access
VPN usually relies on either IPSec or SSL to secure the connection. VPNs provide Layer 2 access to the target
network; these require a tunneling protocol such as PPTP or L2TP running across the base IPSec connection.
The IPSec VPN supports site-to-site VPN for a gateway-to-gateway tunnel and client-to-server VPN for
RV260x Administration Guide
89
Содержание RV260 series
Страница 8: ...RV260x Administration Guide viii Contents ...
Страница 18: ...RV260x Administration Guide 10 Getting Started User Interface ...
Страница 30: ...RV260x Administration Guide 22 Status and Statistics Captive Portal Status ...
Страница 38: ...RV260x Administration Guide 30 Administration Copy Save Configuration ...
Страница 54: ...RV260x Administration Guide 46 System Configuration Registering Devices ...
Страница 80: ...RV260x Administration Guide 72 Wireless Lobby Ambassador ...
Страница 84: ...RV260x Administration Guide 76 Routing IGMP Proxy ...
Страница 96: ...RV260x Administration Guide 88 Firewall DMZ Host ...
Страница 122: ...RV260x Administration Guide 114 QoS Switch Queuing ...
Страница 124: ...RV260x Administration Guide 116 Where To Go Where To Go From Here ...