Virtual Private Networking; Overview Of Fvl328 Policy-Based Vpn Configuration; Using Policies To Manage Vpn Traffic - NETGEAR FVL328 Reference Manual

Prosafe high-speed vpn firewall
Hide thumbs Also See for FVL328:
Table of Contents

Advertisement

This chapter describes how to use the virtual private networking (VPN) features of the FVL328
Firewall. VPN tunnels provide secure, encrypted communications between your local network and
a remote network or computer.

Overview of FVL328 Policy-Based VPN Configuration

The FVL328 uses state-of-the-art firewall and security technology to facilitate controlled and
actively monitored VPN connectivity. Since the FVL328 strictly conforms to Internet Engineering
Task Force (IETF) standards, it is interoperable with devices from major network equipment
vendors.
FVL328 VPN Firewall
Figure 6-1: Secure access through

Using Policies to Manage VPN Traffic

You create policy definitions to manage VPN traffic on the FVL328. There are two kinds of
policies:

Virtual Private Networking

Virtual Private Networking
Telecommuter with
client software
VPN tunnels
encrypt data
FVL328
VPN routers
M-10144-01
Chapter 6
FVL328 VPN Firewall
6-1

Advertisement

Table of Contents
loading

Table of Contents