18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

13<br />

<strong>Sidewinder</strong> <strong>G2</strong> VPN overview<br />

Figure 13-1.<br />

<strong>Sidewinder</strong> <strong>G2</strong>s, an IPSec<br />

or IKE remote site, or a<br />

VPN client machine<br />

13-2 Configuring Virtual Private Networks<br />

Toronto<br />

London<br />

Certificate<br />

server<br />

Internet<br />

One <strong>of</strong> the most advanced features <strong>of</strong> the <strong>Sidewinder</strong> <strong>G2</strong> VPN<br />

solution is the fact that VPN has been embedded into the architecture,<br />

making it an operating characteristic <strong>of</strong> the OS. This integration not<br />

only lets you apply access rules to VPNs in exactly the same way you<br />

do for physically connected networks but also means that you use the<br />

<strong>Sidewinder</strong> <strong>G2</strong> VPN solution to coordinate corporate-wide network<br />

security policies.<br />

As companies expand to new locations and employees spend more<br />

time working out <strong>of</strong> the <strong>of</strong>fice, VPN solutions are becoming more and<br />

more important to businesses. Consider the value <strong>of</strong> encrypting and<br />

authenticating data in these situations:<br />

passing traffic from <strong>Sidewinder</strong> <strong>G2</strong> to <strong>Sidewinder</strong> <strong>G2</strong> between<br />

<strong>of</strong>fices located in different cities.<br />

passing traffic from employees working remotely to your network.<br />

An introduction to IPSec technology<br />

Any IPSec<br />

remote site<br />

VPN client<br />

Sydney<br />

The Internet is a broadcast medium that is used to send information.<br />

While information is in transit, anyone can choose to monitor or<br />

intercept this information.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!