Virtual private network, Irtual private network – Vanguard Managed Solutions Vanguard 342 User Manual
Page 26
![background image](/manuals/219816/26/background.png)
1-6
About the Vanguard 342
Target Applications
Virtual Private Network
Introduction
This section provides a general description of features and applications within the
Vanguard Virtual Private Network (VPN).
These topics are discussed:
• Cost-effective VPN Solutions
• Hardware-based Encryption and Compression
• Standard-based Tunneling and Encryption for IP Traffic
• Multi-protocol Tunneling and Encryption
• Frame Relay and X.25 Encryption
For detailed information about a VPN, refer to your Virtual Private Network Manual
(Part Number T0103-10).
What is a VPN?
A Virtual Private Network (VPN) is a network that has the appearance and many of
the advantages of a dedicated link but occurs over a shared network. Using a
technique called “tunneling,” packets are transmitted across a public routed network,
such as the Internet or other commercially available network, in a private “tunnel”
that simulates a point-to-point connection.
This approach enables network traffic from many sources to travel through separate
tunnels across the same infrastructure. A VPN allows network protocols to traverse
incompatible infrastructures. A VPN also enables traffic from many sources to be
differentiated, so that it can be directed to specific destinations and receive specific
levels of service.
Advantages of a
VPN
A VPN provides following advantages:
• Cost Effectiveness
- Infrastructure Cost - By using a VPN, a company need not invest money
on connectivity equipment like leased lines, WAN switches etcetera. The
connectivity is provided by the service provider.
- Operational Cost - Costs involved with maintaining leased lines or a
private WAN along with the money spent on people to maintain them can
be avoided.
• Manageability
- A VPN is more easily managed when compared to a fully private network.
Requirements of a
VPN
Below are some of the requirements of a VPN:
• Connectivity
- There needs to be network connectivity among the various corporate sites.
This connectivity is typically used through the Internet.
• Security
- Data exchanged between the various corporate sites is confidential. When
data is sent over a public network it is usually encrypted. The encryption
algorithm must be robust enough to withstand any type of snooping.