Chapter 11. Vpn; Overview - Motorola WS5100 Series Migration Giude

Hide thumbs Also See for WS5100 Series:
Table of Contents

Advertisement

This chapter provides detailed feature and configuration information for the VPN features:

Overview

Managing VPN in WS5100
Configuring VPN using CLI
Special Configuration for Windows XP Client
Configuring VPN using the WebUI
Use Case for Remote VPN
Use Case for Site-to- Site VPN
11.1 Overview
Virtual Private Network (VPN) is a private communications network often used within a company, or by
several companies or organizations, to communicate confidentially over a publicly accessible network. VPN
message traffic can be carried over a public networking infrastructure, like the Internet, on top of standard
protocols.
VPN consists of the following:
• Protected or inside network – This provides physical and administrative security to protect the
transmission.
• Outside network or Segment – This is less trustworthy, usually through the Internet.
Generally, a firewall sits between a remote user's workstation or client and the host network or server. As
and when the user's client establishes the communication with the firewall, the client may pass
authentication data to an authentication service inside the perimeter. A known trusted person can be
provided with appropriate security privileges to access resources not available to general users.
VPN client program can be configured such that all IP traffic must pass through the tunnel while the VPN is
active, for better security. This ensures all access outside the employers secure network must pass through
the same firewall just as it would be the case while physically connected to the office ethernet.
VPN

Advertisement

Table of Contents
loading

Table of Contents