Wireless Security White Paper
17
Virtual Private Networks
Virtual Private Networks (VPNs), also known as "tunnels" and commonly used over the Internet
for wired networks, can keep a wireless network hidden from prying eyes. Security experts
recommend that companies use an additional authentication system such as a VPN before
allowing data to cross from a wireless network to an intranet or other corporate system. VPNs
have the following characteristics:
•
User Authentication. The VPN must verify the user’s identity and restrict VPN access to
authorized users. The VPN must also provide audit and accounting records to show who
accessed what information and when.
•
Address Management. The VPN must assign a client’s address on the private network and
assure that addresses are kept private.
•
Data Encryption. The VPN must encrypt information transmitted on the public network.
•
Key Management. The VPN must generate and refresh encryption keys for the client and
server.
•
Multiprotocol Support. The VPN must handle common protocols used on the public network.
Figure 9 (next page) illustrates a VPN used in conjunction with firewalls.
Figure 9: Virtual Private Network (VPN)