12.07.2015 Views

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 7Understanding VPN tunnelsThis chapter includes the following topics:■■■■■Introduction to IP securityTunnelsGroupsVPN PoliciesGlobal IKE PolicyIntroduction to IP securityStandard IP datagrams have no inherent authentication or encryption features. IP packets travel in cleartext on public networks, and anyone with the knowledge, time, and access can intercept and capture thisdata. Packets contain sensitive information such as user names, passwords, or proprietary information,and exposure to this information can have devastating results. To understand how vulnerable IP packetsare, Figure 7-1 shows a typical IP datagram consisting of an IP header, a higher level protocol (such as TCPor UDP), and the payload or data.Figure 7-1Standard IP datagram with expanded packet header

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!