h3h5_in_the_lan.fm
A31003-H3590-S100-7-7620, 06/2012
HiPath 3000/5000 V9, Service documentation
13-35
Nur für den internen Gebrauch
HiPath 3000/5000 in the LAN Network
HG 1500 Board
A VPN provides the following key functions:
●
The tunnel endpoints (gateway or teleworker PC) are reliably identified.
●
Exchanged data is protected from tapping during transmission.
●
Exchanged data is protected from being modified during transmission.
A VPN therefore guarantees that data actually comes from where it appears to have come
from. that they are transferred from there unaltered; and that they are not made known to a third
party on the way.
The HG 1500 provides this function based on IPsec – a secure implementation of the IP pro-
tocol on level 3. This ensures that the VPN is transparent to applications as well as hardware.
The safety functions of VPN are available for the connection of LANs. In this case, they are
completely transparent to the computers participating in the LANs. They can also be used for
connecting individual computers (teleworkers). In this case, the VPN client software installed
on the teleworker PC must be compatible with the VPN functions of HG 1500.
A VPN (Virtual Private Network) is a network where communication is protected as far as hu-
manly possible against tapping, clandestine modification and the misrepresentation of fake tun-
nel endpoints.
The required protocols are available in the HG 1500. Before a VPN can be created, however,
the gateway itself, and especially its administration, must be made secure against attacks.
13.6.9.1
Secure Mode
Unless special measures are taken, HG 1500 operates in non-secure mode. This means,
among other things, that administration access is not encrypted during transmission over the
network.
The gateway recognizes the following security modes:
●
Factory mode: has no configuration data.
●
Insecure mode: gateway is configured, SSL and VPN are disabled. Insecure data trans-
mission is possible.
●
Activation of SSL: intermediate status between introduction of secure mode and configu-
ration of SSL. Access is only possible via CLI at the V.24 interface; no data transmission
is allowed.
●
Secure administration: SSL is enabled. Access via CLI at the V.24 interface and WBM (via
HTTPS) are possible. User data is transferred in insecure mode, and configuration data
and software images are transferred in secure mode.
Содержание HiPath 3000 Series
Страница 1252: ......