C
H A P T E R
16.1 Overview
A virtual private network (VPN) provides secure communications between sites
without the expense of leased site-to-site lines. A secure VPN is a combination of
tunneling, encryption, authentication, access control and auditing. It is used to
transport traffic over the Internet or any insecure network that uses TCP/IP for
communication.
Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible
solutions for secure data communications across a public network like the
Internet. IPSec is built around a number of standardized cryptographic techniques
to provide confidentiality, data integrity and authentication at the IP layer. The
following figure is an example of an IPSec VPN tunnel.
Figure 94 VPN: Example
16.1.1 What You Can Do in the VPN Screens
• Use the Setup screen
policies and add, edit or remove a VPN policy.
• Use the Monitor screen
current active VPN connections.
P-661HNU-Fx User's Guide
VPN Tunnel
X
(Section 16.2 on page
(Section 16.5 on page
16
VPN
Y
220) to view the configured VPN
228) to display and manage the
217