HP SuperStack Firewall Series Manual do Utilizador Página 25

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
Vista de página 24
Introduction to Virtual Private Networking (VPN) 25
NAT automatically translates multiple IP addresses on the private LAN to
one public address that is sent out to the Internet. It enables the Firewall
to be used with broadband modems such as the OfficeConnect Cable
Modem, and with low cost Internet accounts where only one IP address is
provided by the ISP. See Network Addressing Modeon page 149 for
more information.
The DHCP server automatically assigns all PCs on the LAN with the correct
IP information. The DHCP client allows the Firewall to acquire the correct
IP settings from the ISP. See Setting up the DHCP Serveron page 155
for more information.
Introduction to
Virtual Private
Networking (VPN)
The Firewall includes support for IPSec Virtual Private Networking. This
section provides an introduction to Virtual Private Networking (VPN).
Virtual Private
Networking
Todays business environment requires close, real-time collaboration with
trading partners, legal, and financial advisors, as well as remote workers
andbranchoffices.Thisreal-timerequirement often leads to the
creation of an extranetwhere branch offices and partners are
connected to a primary network in one of two ways:
Leasing dedicated data lines to connect all sites.
Using the public Internet to connect all sites and remote users
together.
Each of these methods has its benefits and drawbacks. Establishing a
leased line connection between the sites offers a dedicated, secure access
but at a very high cost.
The other option is to use an existing Internet connection to transmit data
unencrypted over the public Internet network. While this option is less
expensive and can provide higher performance, it is much less secure
than dedicated site-leased lines.
VPN uses data encryption and the public Internet to provide secure
communications between sites without incurring the huge expense of
site to site leased lines.
The Firewall embodies eight different levels of encryption that can be
used to create a VPN tunnel. For the tunnel to work correctly, the
DUA1611-0AAA02.book Page 25 Thursday, August 2, 2001 4:01 PM
Vista de página 24
1 2 ... 20 21 22 23 24 25 26 27 28 29 30 ... 213 214

Comentários a estes Manuais

Sem comentários