272
Appendix C: Virtual Private Networks
Privacy Without Trust (Private Link)
A VPN without trust does not expand the concept of trust to include the machines within
the remote defense perimeter. In this case, the traffic between the two networks is
encrypted, providing the privacy. Once it decrypts the traffic, the remote firewall still
considers the request as being from an untrusted network. The request is the same as any
other that comes from an untrusted network, but with the additional benefit of
encryption.
For example, Yoyodyne sets up a VPN without trust between the Maryland and
California offices. Traffic between the two offices is still encrypted. When the firewall for
the California office receives and decrypts a TELNET request from a machine at the
Maryland office, it will treat the request as it would any other untrusted network. They
cannot send UDP packets between the two networks, or trust NTP from the other site as
they could using a VPN with privacy with trust.
You can create private links for host-to-host, network-to-network, or host-to-network
communications. The most common use of privacy without trust creates a private link
between two networks.
Sites that create a VPN without trust must of course share the encryption key that gives
them the privacy. However, they can now use different policies and procedures and have
different administrative control.
Encryption Through Multiple Firewalls (Passthrough Link)
A VPN can use encryption through a series of firewalls. In this case, the traffic between
the outer firewalls is encrypted, but the firewalls in between simply pass the encrypted
data through. They do not decrypt the data nor do they have the encryption key.
For example, Yoyodyne sets up a VPN (with or without trust) between the firewall for
the accounting department in Maryland and the firewall for the accounting department
in California. On the firewall for the entire Maryland office (which includes the
accounting department), Yoyodyne creates a passthrough link. This link simply passes
the encrypted traffic from the accounting firewall in Maryland on to the accounting
firewall in California. The administrators in the California office must create a similar
passthrough link on their firewall to pass encrypted traffic to the accounting firewall in
the California office.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......