Compaq Armada m700 Wireless Security - Page 17
Virtual Private Networks
View all Compaq Armada m700 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 17 highlights
Wireless Security White Paper 17 Virtual Private Networks Virtual Private Networks (VPNs), also known as "tunnels" and commonly used over the Internet for wired networks, can keep a wireless network hidden from prying eyes. Security experts recommend that companies use an additional authentication system such as a VPN before allowing data to cross from a wireless network to an intranet or other corporate system. VPNs have the following characteristics: • User Authentication. The VPN must verify the user's identity and restrict VPN access to authorized users. The VPN must also provide audit and accounting records to show who accessed what information and when. • Address Management. The VPN must assign a client's address on the private network and assure that addresses are kept private. • Data Encryption. The VPN must encrypt information transmitted on the public network. • Key Management. The VPN must generate and refresh encryption keys for the client and server. • Multiprotocol Support. The VPN must handle common protocols used on the public network. Figure 9 (next page) illustrates a VPN used in conjunction with firewalls. Figure 9: Virtual Private Network (VPN)