This chapter describes how to use the virtual private networking (VPN) features of the FVL328
Firewall. VPN tunnels provide secure, encrypted communications between your local network and
a remote network or computer.
Overview of FVL328 Policy-Based VPN Configuration
The FVL328 uses state-of-the-art firewall and security technology to facilitate controlled and
actively monitored VPN connectivity. Since the FVL328 strictly conforms to Internet Engineering
Task Force (IETF) standards, it is interoperable with devices from major network equipment
vendors.
FVL328 VPN Firewall
Figure 6-1: Secure access through
Using Policies to Manage VPN Traffic
You create policy definitions to manage VPN traffic on the FVL328. There are two kinds of
policies:
Virtual Private Networking
Virtual Private Networking
Telecommuter with
client software
VPN tunnels
encrypt data
FVL328
VPN routers
M-10144-01
Chapter 6
FVL328 VPN Firewall
6-1