C
H A P T E R
14.1 Overview
A virtual private network (VPN) provides secure communications between sites
without the expense of leased site-to-site lines. A secure VPN is a combination of
tunneling, encryption, authentication, access control and auditing. It is used to
transport traffic over the Internet or any insecure network that uses TCP/IP for
communication.
Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible
solutions for secure data communications across a public network like the
Internet. IPSec is built around a number of standardized cryptographic techniques
to provide confidentiality, data integrity and authentication at the IP layer. The
following figure is an example of an IPSec VPN tunnel.
Figure 144 VPN: Example
14.1.1 What You Can Do in the VPN Screens
• Use the Setup screen
policies and add, edit or remove a VPN policy.
• Use the Monitor screen
current active VPN connections.
• Use the VPN Global Setting screen
NetBIOS packets passing through the VPN connection.
P-2612HW-F1 User's Guide
Internet
VPN Tunnel
X
(Section 14.2 on page
(Section 14.7 on page
(Section 14.8 on page
14
VPN
Y
262) to view the configured VPN
277) to display and manage the
279) to allow
259