Security Through A Vpn - Fritz! Fon WLAN 7390 Installation, Configuration And Operation

Table of Contents

Advertisement

Security through a VPN

5.2
Security through a VPN
Authenticity
Confidentiality
Integrity
Local network A
The terminals of the tunnels can be individual computers
or entire networks. For instance, telecommuters or field
staff can connect to the company network via VPN. The lo-
cal network at a branch office can also be connected to
the local network of company headquarters via VPN. Both
of the locations securely connected over VPN must have
an Internet connection at their disposal.
A VPN fulfills the following security requirements for data
transmission:
Authenticity
Confidentiality
Integrity
Authenticity ensures that no unauthorized users can ac-
cess the local network via VPN.
It also makes sure that incoming data actually come from
the registered party and not from another source.
Confidentiality requires the nondisclosure of data. Confi-
dentiality can be guaranteed by encrypting the data. En-
cryption means that unauthorized third parties cannot ob-
tain any knowledge about the transmitted data.
Integrity ensures that the data are not changed, recorded
or diverted during transmission.
161
Internet
Tunnel
Tunnel
Local network B

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents