Compaq Evo n800c Wireless Security - Page 17

Virtual Private Networks

Page 17 highlights

Wireless Security White Paper 17 Virtual Private Networks Virtual Private Networks (VPNs), also known as "tunnels" and commonly used over the Internet for wired networks, can keep a wireless network hidden from prying eyes. Security experts recommend that companies use an additional authentication system such as a VPN before allowing data to cross from a wireless network to an intranet or other corporate system. VPNs have the following characteristics: • User Authentication. The VPN must verify the user's identity and restrict VPN access to authorized users. The VPN must also provide audit and accounting records to show who accessed what information and when. • Address Management. The VPN must assign a client's address on the private network and assure that addresses are kept private. • Data Encryption. The VPN must encrypt information transmitted on the public network. • Key Management. The VPN must generate and refresh encryption keys for the client and server. • Multiprotocol Support. The VPN must handle common protocols used on the public network. Figure 9 (next page) illustrates a VPN used in conjunction with firewalls. Figure 9: Virtual Private Network (VPN)

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30

Wireless Security White Paper
17
Virtual Private Networks
Virtual Private Networks (VPNs), also known as "tunnels" and commonly used over the Internet
for wired networks, can keep a wireless network hidden from prying eyes. Security experts
recommend that companies use an additional authentication system such as a VPN before
allowing data to cross from a wireless network to an intranet or other corporate system. VPNs
have the following characteristics:
User Authentication. The VPN must verify the user’s identity and restrict VPN access to
authorized users. The VPN must also provide audit and accounting records to show who
accessed what information and when.
Address Management. The VPN must assign a client’s address on the private network and
assure that addresses are kept private.
Data Encryption. The VPN must encrypt information transmitted on the public network.
Key Management. The VPN must generate and refresh encryption keys for the client and
server.
Multiprotocol Support. The VPN must handle common protocols used on the public network.
Figure 9 (next page) illustrates a VPN used in conjunction with firewalls.
Figure 9: Virtual Private Network (VPN)