Figure 14-1 Encryption And Decryption - Nortel Contivity 251 User Manual

Vpn switch
Hide thumbs Also See for Contivity 251:
Table of Contents

Advertisement

14-2 Introduction to IPSec

Figure 14-1 Encryption and Decryption

Data Confidentiality
The IPSec sender can encrypt packets before transmitting them across a network.
Data Integrity
The IPSec receiver can validate packets sent by the IPSec sender to ensure that the
data has not been altered during transmission.
Data Origin Authentication
The IPSec receiver can verify the source of IPSec packets. This service depends on
the data integrity service.
14.1.4
VPN Applications
The Contivity 251 supports the following VPN applications.
Linking Two or More Private Networks Together
Connect branch offices and business partners over the Internet with significant
cost savings and improved performance when compared to leased lines
between sites.
Accessing Network Resources When NAT Is Enabled
When NAT is enabled, remote users are not able to access hosts on the LAN
unless the host is designated a public LAN server for that specific protocol.
Since the VPN tunnel terminates inside the LAN, remote users will be able to
access all computers that use private IP addresses on the LAN.
Unsupported IP Applications
A VPN tunnel may be created to add support for unsupported emerging IP
applications.
317516-A Rev 00

Advertisement

Table of Contents
loading

Table of Contents