Vpn Benefit; Related Terminology Explanation; Security Association; Ipsec Algorithms - Planet Networking & Communication MH-5001 User Manual

Multi-homing utm security gateway
Table of Contents

Advertisement

MH-5001 User Manual

12.1 VPN benefit

If you choose to implement VPN technology in your enterprise, then it may bring the following benefits to your company.
1.
Authentication
Ensure the data received is the same as the data that was sent and that the claimed sender is in fact the actual sender.
2.
Integrity
Ensure that data is transmitted from source to destination without undetected alteration.
3.
Confidentiality
Guarantee the intended recipients know what was being sent but unintended parties cannot determine what was sent. This is almost
provided by data encryption.
4.
Non-repudiation
The receiver being able to prove that the sender of some data did in fact send the data even though the sender might later desire to
deny ever having sent that data.

12.2 Related Terminology Explanation

12.2.1 VPN
A VPN (Virtual Private Network) logically provides secure communications between sites without the expense of leased site-to-site
lines. A secure VPN is a combination of encryption, tunneling, authentication, and access control used to transport traffic over the
Internet or any insecure TCP/IP networks.
12.2.2 IPSec
Internet Protocol Security (IPSec) is a standard-based VPN that offers flexible solutions for secure data communications across a
public network like the Internet. IPSec is built around a number of standardized cryptographic techniques to provide confidentiality,
data integrity and authentication at the IP layer.

12.2.3 Security Association

A Security Association (SA) is an agreement between two parties indicating what security parameters, such as keys and algorithms
they will use.

12.2.4 IPSec Algorithms

There are two types of the algorithms in the IPSec, including (1) Encryption Algorithms such as DES (Data Encryption Standard),
and 3DES (Triple DES) algorithms, and (2) Authentication Algorithms such as HMAC-MD5 (RFC 2403), and HMAC-SHA1 (RFC
2404).
VPN Technical Introduction
95
VPN Technical Introduction
Chapter 12
This chapter introduces VPN related technology
Chapter 12

Advertisement

Table of Contents
loading

Table of Contents