18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Sidewinder</strong> <strong>G2</strong> VPN overview<br />

13-4 Configuring Virtual Private Networks<br />

When used together, encryption and authentication are very much<br />

like writing an encoded message, sealing it in an envelope, and then<br />

signing your name across the flap. The receiver can first verify that the<br />

signature is yours as a means <strong>of</strong> determining the origin <strong>of</strong> the<br />

message. Next, the receiver can determine if the contents have been<br />

viewed or altered by checking that the envelope seal has not been<br />

compromised. Once the receiver is assured <strong>of</strong> the authenticity <strong>of</strong> the<br />

message, they can decode the contents and “trust” that the contents<br />

are as intended.<br />

VPN configuration options<br />

VPN involves establishing an association (or a trust relationship)<br />

between your <strong>Sidewinder</strong> <strong>G2</strong> and an IPSec-compliant remote<br />

<strong>Sidewinder</strong> <strong>G2</strong>, host, or client. (These entities are referred to as “VPN<br />

peers.”) Once this trust relationship is defined, data sent between the<br />

two ends is encrypted and then authenticated before it is transmitted.<br />

There are three important concepts that comprise the <strong>Sidewinder</strong> <strong>G2</strong><br />

VPN:<br />

IPSec keys, which determine how the information is encrypted<br />

and decrypted, and may be manually or automatically exchanged.<br />

certificates, pre-shared passwords, and extended authentication,<br />

which authenticate the VPN peer.<br />

tunnel or transport encapsulation, two methods <strong>of</strong> how header<br />

information is passed.<br />

Understanding the options associated with each concept will assist<br />

you greatly in creating your security association. Study the following<br />

information to help you determine which VPN configuration best suits<br />

your network environment.<br />

About IPSec keys<br />

A key is a number that is used to electronically sign, encrypt and<br />

authenticate data when you send it, and decrypt and authenticate<br />

your data when it is received. When a VPN is established between<br />

two sites, two keys are generated for each remote end: an encryption<br />

key and an authentication key.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!