18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 14: Configuring Virtual Private Networks<br />

<strong>Sidewinder</strong> <strong>G2</strong> VPN overview<br />

<strong>Sidewinder</strong> <strong>G2</strong><br />

VPN overview<br />

394<br />

Figure 171:<br />

<strong>Sidewinder</strong> <strong>G2</strong>s, an IPSec<br />

or IKE remote site, or a<br />

VPN client machine<br />

The <strong>Sidewinder</strong> <strong>G2</strong> VPN solution provides secure data transmission through<br />

an encryption and decryption process. The <strong>Sidewinder</strong> <strong>G2</strong> uses the Internet<br />

Key Exchange (IKE) to support this process. The <strong>Sidewinder</strong> <strong>G2</strong> also supports<br />

the use <strong>of</strong> manually configured encryption keys.<br />

Toronto<br />

London<br />

Certificate<br />

server<br />

Internet<br />

Any IPSec<br />

remote site<br />

VPN client<br />

Sydney<br />

One <strong>of</strong> the most advanced features <strong>of</strong> the <strong>Sidewinder</strong> <strong>G2</strong> VPN solution is the<br />

fact that VPN has been embedded into the architecture, making it an operating<br />

characteristic <strong>of</strong> the OS. This integration not only lets you apply access rules to<br />

VPNs in exactly the same way you do for physically connected networks but<br />

also means that you use the <strong>Sidewinder</strong> <strong>G2</strong> VPN solution to coordinate<br />

corporate-wide network security policies.<br />

As companies expand to new locations and employees spend more time<br />

working out <strong>of</strong> the <strong>of</strong>fice, VPN solutions are becoming more and more<br />

important to businesses. Consider the value <strong>of</strong> encrypting and authenticating<br />

data in these situations:<br />

• passing traffic from <strong>Sidewinder</strong> <strong>G2</strong> to <strong>Sidewinder</strong> <strong>G2</strong> between <strong>of</strong>fices<br />

located in different cities.<br />

• passing traffic from employees working remotely to your network.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!