AVM FRITZ!Box 6320 Cable Installation, Configuration And Operation page 41

Cable connection
Table of Contents

Advertisement

VPN: Remote Access to the Home Network
of company headquarters via VPN. Both of the locations se-
curely connected over VPN must have an Internet connection
at their disposal.
Security through a VPN
A VPN fulfills the following security requirements for data
transmission:
Authenticity
Authenticity ensures that no unauthorized users can access
the local network via VPN.
It also makes sure that incoming data actually come from the
registered party and not from another source.
Confidentiality
Confidentiality requires the nondisclosure of data. Confiden-
tiality can be guaranteed by encrypting the data. Encryption
means that unauthorized third parties cannot obtain any
knowledge about the transmitted data.
Integrity
Integrity ensures that the data are not changed, recorded or
diverted during transmission.
The VPN tunnel fulfills these security requirements. The VPN
tunnel is implemented using a tunnel protocol.
Tunnel Technology
A tunnel is created by placing an IP packet to be transmitted
inside of an additional, new IP packet.
An IP packet is composed of the IP header and the user data.
The IP header contains the IP address of the destination and
the IP address of the sender.
Authenticity
Confidentiality
Integrity
41

Advertisement

Table of Contents
loading

Table of Contents