Ipsec Architecture; Figure 12-2 Ipsec Architecture - ZyXEL Communications ZyWALL 5 User Manual

Internet security appliance
Hide thumbs Also See for ZyWALL 5:
Table of Contents

Advertisement

ZyWALL 5 Internet Security Appliance
Data Integrity
The IPSec receiver can validate packets sent by the IPSec sender to ensure that the data has not been
altered during transmission.
Data Origin Authentication
The IPSec receiver can verify the source of IPSec packets. This service depends on the data integrity
service.
12.1.4 VPN Applications
The ZyWALL supports the following VPN applications.
Linking Two or More Private Networks Together
Connect branch offices and business partners over the Internet with significant cost savings
and improved performance when compared to leased lines between sites.
Accessing Network Resources When NAT Is Enabled
When NAT is enabled, remote users are not able to access hosts on the LAN unless the host is
designated a public LAN server for that specific protocol. Since the VPN tunnel terminates
inside the LAN, remote users will be able to access all computers that use private IP addresses
on the LAN.
Unsupported IP Applications
A VPN tunnel may be created to add support for unsupported emerging IP applications. See
the chapter on Getting to Know Your ZyWALL for an example of a VPN application.

12.2 IPSec Architecture

The overall IPSec architecture is shown as follows.
12-2

Figure 12-2 IPSec Architecture

Introduction to IPSec

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents