Table 8 Adding/Editing Source and Destination Addresses
LABEL
End IP Address
Subnet Mask
5.9 VPN Overview
A VPN (Virtual Private Network) provides secure communications between sites without the
expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption,
authentication, access control and auditing technologies/services used to transport traffic over the
Internet or any insecure network that uses the TCP/IP protocol suite for communication.
The following figure provides an example of a VPN application.
5.10 Summary Screen
Local and remote IP addresses must be static.
Prestige 652H/HW
Enter the ending IP address in a range here.
Enter the subnet mask here, if applicable.
Figure 22 VPN Application
DESCRIPTION
26