18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Protecting your<br />

information<br />

What are encryption and<br />

authentication?<br />

<strong>Sidewinder</strong> <strong>G2</strong> VPN overview<br />

Sending information beyond your <strong>Sidewinder</strong> <strong>G2</strong> via the Internet is<br />

like sending an unsealed envelope <strong>of</strong> important information via a<br />

courier service: you must trust that the courier will not read or steal<br />

the information.<br />

To address this danger, an organization known as IETF (Internet<br />

Engineering Task Force) developed a standard for protecting data on<br />

unprotected (or untrusted) networks such as the Internet. The<br />

standard has become known as IPSec, meaning Internet-Protocol<br />

Security. In brief, IPSec calls for encrypting the data before it leaves<br />

the local host, then decrypting it (removing its “cloak” <strong>of</strong> encryption)<br />

when it is received at the destination or remote host. Once it is<br />

decrypted, the data assumes its original form and can be read as<br />

intended. No matter how long or circuitous its route through the<br />

Internet, the data remains private by virtue <strong>of</strong> its encryption.<br />

The two main components <strong>of</strong> IPSec security are encryption and<br />

authentication.<br />

Encryption — Encryption is the means by which plain text is<br />

“cloaked.” It ensures that the transmitted data remains private and<br />

unreadable until properly decrypted. The <strong>Sidewinder</strong> <strong>G2</strong> uses an<br />

encryption key to encipher and decipher each unit <strong>of</strong> data sent<br />

between your site and the “partner” or remote VPN site. (See<br />

“About IPSec keys” on page 13-4.)<br />

Authentication — VPN authentication prevents unauthorized<br />

individuals from tampering with the contents <strong>of</strong> the data being<br />

transmitted. It also prevents them from creating messages that<br />

claim to come from a particular place but are actually sent from<br />

somewhere else (such as the hacker’s home computer).<br />

Authentication is accomplished through two methods:<br />

— Data-integrity checking, which allows the receiver to verify<br />

whether the data was modified or corrupted during transmission.<br />

— Sender identification, which allows the receiver to verify<br />

whether the data transmission originated from the source that<br />

claims to have sent it.<br />

Configuring Virtual Private Networks 13-3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!