HP 635n Practical IPsec Deployment for Printing and Imaging Devices - Page 5

IPsec and Virtual Private Networks

Page 5 highlights

IPsec and Virtual Private Networks Before the age of the Internet as we've come to know it, when a large company wanted to enable "secure" data communication between its offices, the choices were limited. Back then, a company would often lease dedicated phone lines from the telephone company to act as data lines. These telephone lines were called "leased lines". Leased lines were dedicated to the company that leased them and did not have other customers on them. Refer to Figure 2 - Leased Lines. Leased Lines from Telephone Company Remote Router Corporate Router Remote Office Remote Router Remote Office Remote Router Remote Office Remote Router Corporate Figure 2 - Leased Lines Remote Office Unfortunately, this strategy often left the Corporate Router as a single point of failure for network communications - a problem with the Corporate Router would result in the Remote Offices being unable to communicate as well. To remedy this situation required more leased lines. Refer to Figure 3 - Meshed Lines 5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

5
IPsec and Virtual Private Networks
Before the age of the Internet as we’ve come to know it, when a large company wanted to enable
“secure” data communication between its offices, the choices were limited.
Back then, a company
would often lease dedicated phone lines from the telephone company to act as data lines.
These
telephone lines were called “leased lines”.
Leased lines were dedicated to the company that leased
them and did not have other customers on them.
Refer to Figure 2 – Leased Lines.
Remote Office
Corporate
Corporate Router
Remote Router
Remote Office
Remote Office
Remote Office
Remote Router
Remote Router
Remote Router
Leased Lines from
Telephone Company
Figure 2 - Leased Lines
Unfortunately, this strategy often left the Corporate Router as a single point of failure for network
communications – a problem with the Corporate Router would result in the Remote Offices being
unable to communicate as well.
To remedy this situation required more leased lines.
Refer to Figure
3 – Meshed Lines