User's Manual

Table Of Contents
User Guide 107
CHAPTER 9 Configuring Virtual
Private Networks
You use a virtual private networ
k
(VPN) to create secure connections
between computers or networks in different locations. The networks
and hosts on a VPN can be corporate headquarters, branch offices,
remote users, and telecommuters. VPN tunnels are secured, and the
identity of the sender and the receiver are authenticated. Data on the
tunnel is encrypted. Only the sender and the receiver of the message
can read it.
What You Need to Create a VPN
Two Firebox X Edge devices or one Firebox X Edge and a second
device that uses IPSec standards. An example of such a device is a
Firebox X. You must enable the VPN option on each device.