Netgear FVM318 FVM318 Reference Manual - Page 147

How Does VPN Work?

Page 147 highlights

Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall How Does VPN Work? A VPN can be thought of as a secure tunnel passing through the Internet, connecting two devices such as a PC or router, which form the two tunnel endpoints. At one endpoint, data is encapsulated and encrypted, then transmitted through the Internet. At the far endpoint, the data is received, unencapsulated and decrypted. Although the data may pass through several Internet routers between the endpoints, the encapsulation and encryption forms a virtual "tunnel" for the data. DATA PACKET ENCRYPTION AND ENCAPSULATION TRANSMISSION VIA INTERNET INTERNET UNENCAPSULATION AND DECRYPTION DATA PACKET Figure 8-6: VPN overview The tunnel endpoint device, which encodes or decodes the data, can either be a PC running VPN client software or a VPN-enabled router or server. Several software standards exist for VPN data encapsulation and encryption, such as PPTP and IPSec. Your FVM318 firewall uses both PPTP and IPSec. To set up a VPN connection, you must configure each endpoint with specific identification and connection information describing the other endpoint. This set of configuration information defines a security association (SA) between the two points. IKE: Managing and Exchanging Keys IKE (Internet Key Exchange protocol) is the protocol used to perform key exchange between IPSec devices. In order to initiate communication, the following tasks need to be done: • Negotiate security protocols, encryption algorithms and keys with all communicating peers Network, Routing, Firewall, and Wireless Basics B-21

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184

Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Network, Routing, Firewall, and Wireless Basics
B-21
How Does VPN Work?
A VPN can be thought of as a secure tunnel passing through the Internet, connecting two devices
such as a PC or router, which form the two tunnel endpoints. At one endpoint, data is encapsulated
and encrypted, then transmitted through the Internet. At the far endpoint, the data is received,
unencapsulated and decrypted. Although the data may pass through several Internet routers
between the endpoints, the encapsulation and encryption forms a virtual “tunnel” for the data.
Figure 8-6: VPN overview
The tunnel endpoint device, which encodes or decodes the data, can either be a PC running VPN
client software or a VPN-enabled router or server. Several software standards exist for VPN data
encapsulation and encryption, such as PPTP and IPSec. Your FVM318 firewall uses both PPTP
and IPSec.
To set up a VPN connection, you must configure each endpoint with specific identification and
connection information describing the other endpoint. This set of configuration information
defines a security association
(SA) between the two points.
IKE: Managing and Exchanging Keys
IKE (Internet Key Exchange protocol) is the protocol used to perform key exchange between
IPSec devices. In order to initiate communication, the following tasks need to be done:
Negotiate security protocols, encryption algorithms and keys with all communicating peers
DATA PACKET
ENCRYPTION AND ENCAPSULATION
UNENCAPSULATION AND DECRYPTION
INTERNET
TRANSMISSION
VIA INTERNET
DATA PACKET