About Virtual Private Networks (VPNs)
Digi TransPort User Guide
389
About Virtual Private Networks (VPNs)
This section provides background on IPSec and VPNs.
VPNs
Virtual Private Networks (VPNs) are used to securely connect two private networks together so
that devices may connect from one network to the other network using secure channels. VPN
uses IP Security (IPSec) technology to protect the transferring of data over the Internet. This
section covers concepts and settings for configuring VPNs.
VPNs (Virtual Private Networks) are networks that use the IPSec protocols to provide one or more
secure routes, or tunnels, between endpoints. Users are issued either a shared secret key or
public/ private key pair that is associated with their identity. When a message is sent from one
user to another, it is automatically signed with the user’s key. The receiver uses the secret key or
the sender’s public key to decrypt the message. These keys are used during IKE exchanges along
with other information to create session keys that only apply for the lifetime of that IKE exchange.
About Internet Protocol Security (IPSec)
An inherent problem with the TCP protocol used to carry data over the vast majority of LANs and
the Internet is that it provides virtually no security features. This lack of security, and publicity
about hackers and viruses, prevent many people from even considering using the Internet for
any sensitive business application. IPSec provides a remedy for these weaknesses adding a
comprehensive security layer to protect data carried over IP links.
IPSec (Internet Protocol Security) is a framework for a series of IETF standards designed to
authenticate users and data, and to secure data by encrypting it during transit.
Benefits of IPSec
• IPSec is typically used to attain confidentiality, integrity, and authentication in the transport of
data across inherently insecure channels.
• When properly configured, IPSec provides a highly secure virtual channel across cheap,
globally available networks such as the Internet, or creates a “network within a network” for
applications such as passing confidential information between two users across a private
network.
Содержание TransPort
Страница 1: ...User Guide Digi TransPort ...
Страница 95: ...Regulatory and safety statements Digi TransPort User Guide 95 TransPort WR41Declaration of Conformity ...
Страница 96: ...Regulatory and safety statements Digi TransPort User Guide 96 ...
Страница 97: ...Regulatory and safety statements Digi TransPort User Guide 97 TransPort WR44 Declaration of Conformity ...
Страница 773: ...Manage files Digi TransPort User Guide 773 For example ...