User's Manual
P-2612HW Series User’s Guide
257
CHAPTER 14
VPN
14.1 Overview
A virtual private network (VPN) provides secure communications between sites
without the expense of leased site-to-site lines. A secure VPN is a combination of
tunneling, encryption, authentication, access control and auditing. It is used to
transport traffic over the Internet or any insecure network that uses TCP/IP for
communication.
Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible
solutions for secure data communications across a public network like the
Internet. IPSec is built around a number of standardized cryptographic techniques
to provide confidentiality, data integrity and authentication at the IP layer. The
following figure is an example of an IPSec VPN tunnel.
Figure 157 VPN: Example
14.1.1 What You Can Do in the VPN Screens
•Use the Setup screen (Section 14.2 on page 260) to view the configured VPN
policies and add, edit or remove a VPN policy.
•Use the Monitor screen (Section 14.7 on page 275) to display and manage the
current active VPN connections.
•Use the VPN Global Setting screen (Section 14.8 on page 277) to allow
NetBIOS packets passing through the VPN connection.
VPN Tunnel
X
Y
Internet