Why Vpn In Firewalls - D-Link DFL-1600 User Manual

Network security firewall
Hide thumbs Also See for DFL-1600:
Table of Contents

Advertisement

200
The CA creates the certificate by signing the authenticating public key and
the identity information of the key holder with its own private key. The
recipients have copies of CA's public key to be able to validate the
certificate signature and trust the CA and the signed public key.
The CAs are also responsible for managing the CRLs to report the
certificates that are no longer valid because, for example, the corresponding
private key is compromised or the identity information has changed.
20.3

Why VPN in Firewalls

Virtual Private Network (VPN) may be implemented in many different
ways. The greatest differences lie in whether or not to use security
gateways: network devices whose purpose is to perform the work of
encryption and authentication. There are both benefits and drawbacks of
every different security gateway deployment.
The security gateway, may be placed in several different locations in
relation to your border router and your firewall :
Outside the firewall, in-line
Outside the firewall, on the external network
Between the firewall and the internal network
On the internal network
In a separate DMZ
Incorporated in the firewall itself
Each scenario above has its distinct benefits and drawbacks. Issues that
need to be considered include:
Can the firewall protect the security gateway and log attempted
attacks on it?
Does the configuration support roaming clients?
Can the firewall inspect and log traffic passing in and out of the VPN?
Does the configuration add points of failure to the Internet
connection?
D-Link Firewalls User's Guide
Chapter 20. VPN Basics

Advertisement

Table of Contents
loading

Table of Contents