Chapter 12 Vpn Technical Introduction; Vpn Benefit; Related Terminology Explanation; Vpn - D-Link DFL-900 User Manual

D-link dfl-900; dfl-1500 vpn/firewall router
Hide thumbs Also See for DFL-900:
Table of Contents

Advertisement

Part V
Virtual Private Network

12.1 VPN benefit

If you choose to implement VPN technology in your enterprise, then it may bring the following benefits to your company.
1.
Authentication
Ensure the data received is the same as the data that was sent and that the claimed sender is in fact the actual sender.
2.
Integrity
Ensure that data is transmitted from source to destination without undetected alteration.
3.
Confidentiality
Guarantee the intended recipients know what was being sent but unintended parties cannot determine what was sent. This is almost
provided by data encryption.
4.
Non-repudiation
The receiver being able to prove that the sender of some data did in fact send the data even though the sender might later desire to
deny ever having sent that data.

12.2 Related Terminology Explanation

12.2.1 VPN

A VPN (Virtual Private Network) logically provides secure communications between sites without the expense of leased site-to-site
lines. A secure VPN is a combination of encryption, tunneling, authentication, and access control used to transport traffic over the
Internet or any insecure TCP/IP networks.

12.2.2 IPSec

Internet Protocol Security (IPSec) is a standard-based VPN that offers flexible solutions for secure data communications across a
public network like the Internet. IPSec is built around a number of standardized cryptographic techniques to provide confidentiality,
data integrity and authentication at the IP layer.

12.2.3 Security Association

A Security Association (SA) is an agreement between two parties indicating what security parameters, such as keys and algorithms
they will use.

12.2.4 IPSec Algorithms

There are two types of the algorithms in the IPSec, including (1) Encryption Algorithms such as DES (Data Encryption Standard),
and 3DES (Triple DES) algorithms, and (2) Authentication Algorithms such as HMAC-MD5 (RFC 2403), and HMAC-SHA1 (RFC
2404).
D-Link
VPN Technical Introduction
This chapter introduces VPN related technology
102
Chapter 12

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dfl-1500

Table of Contents