Compaq 470012-741 - Armada 110 - Celeron 700 MHz Manual page 17

Wireless security
Hide thumbs Also See for 470012-741 - Armada 110 - Celeron 700 MHz:
Table of Contents

Advertisement

Wireless Security White Paper
Virtual Private Networks
Virtual Private Networks (VPNs), also known as "tunnels" and commonly used over the Internet
for wired networks, can keep a wireless network hidden from prying eyes. Security experts
recommend that companies use an additional authentication system such as a VPN before
allowing data to cross from a wireless network to an intranet or other corporate system. VPNs
have the following characteristics:
User Authentication. The VPN must verify the user's identity and restrict VPN access to
authorized users. The VPN must also provide audit and accounting records to show who
accessed what information and when.
Address Management. The VPN must assign a client's address on the private network and
assure that addresses are kept private.
Data Encryption. The VPN must encrypt information transmitted on the public network.
Key Management. The VPN must generate and refresh encryption keys for the client and
server.
Multiprotocol Support. The VPN must handle common protocols used on the public network.
Figure 9 (next page) illustrates a VPN used in conjunction with firewalls.
Figure 9: Virtual Private Network (VPN)
17

Advertisement

Table of Contents
loading

Table of Contents