C
H A P T E R
13.1 Overview
A virtual private network (VPN) provides secure communications between sites
without the expense of leased site-to-site lines. A secure VPN is a combination of
tunneling, encryption, authentication, access control and auditing. It is used to
transport traffic over the Internet or any insecure network that uses TCP/IP for
communication.
Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible
solutions for secure data communications across a public network like the
Internet. IPSec is built around a number of standardized cryptographic techniques
to provide confidentiality, data integrity and authentication at the IP layer. The
following figure is an example of an IPSec VPN tunnel.
Figure 74 VPN: Example
13.1.1 What You Can Do in this Chapter
• Use the Settings screen to view the configured IPSec policies and add, edit or
remove a policy
• Use the Status screen to display and manage the current active VPN
connections
P-660HN-51 User's Guide
VPN Tunnel
X
(Section 13.2 on page
(Section 13.3 on page
188).
Y
179).
13
IPSec
177