This chapter describes how to use the virtual private networking (VPN) features of the FVS328
Firewall. VPN tunnels provide secure, encrypted communications between your local network and
a remote network or computer.
Overview of FVS328 Policy-Based VPN Configuration
The FVS328 uses state-of-the-art firewall and security technology to facilitate controlled and
actively monitored VPN connectivity. Since the FVS328 strictly conforms to Internet Engineering
Task Force (IETF) standards, it is interoperable with devices from major network equipment
vendors.
VPN Firewall
Figure 7-1: Secure access through FVS328 VPN routers
Using Policies to Manage VPN Traffic
You create policy definitions to manage VPN traffic on the FVS328. There are two kinds of
policies:
Virtual Private Networking
Virtual Private Networking
Telecommuter with
client software
VPN tunnels
encrypt data
May 2004, 202-10031-01
Chapter 7
VPN Firewall
7-1