72 lines
5.7 KiB
HTML
72 lines
5.7 KiB
HTML
|
<?xml version="1.0" encoding="UTF-8"?>
|
||
|
<!DOCTYPE html
|
||
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||
|
<html lang="en-us" xml:lang="en-us">
|
||
|
<head>
|
||
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
||
|
<meta name="security" content="public" />
|
||
|
<meta name="Robots" content="index,follow" />
|
||
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
||
|
<meta name="DC.Type" content="concept" />
|
||
|
<meta name="DC.Title" content="VPN concepts" />
|
||
|
<meta name="abstract" content="It is important that you have at least a basic knowledge of standard VPN technologies. This topic provides you with conceptual information about the protocols VPN uses in its implementation." />
|
||
|
<meta name="description" content="It is important that you have at least a basic knowledge of standard VPN technologies. This topic provides you with conceptual information about the protocols VPN uses in its implementation." />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzajagetstart.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzajaipsec.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzajasecassociations.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzajal2tpprotocol.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzajal2tp_pres.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzajavpnnat.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzajaudpencap.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzajaipcomp.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzajavpnwfilter.htm" />
|
||
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2000, 2006" />
|
||
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2000, 2006" />
|
||
|
<meta name="DC.Format" content="XHTML" />
|
||
|
<meta name="DC.Identifier" content="rzajavpnprotocols" />
|
||
|
<meta name="DC.Language" content="en-us" />
|
||
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
||
|
<!-- US Government Users Restricted Rights -->
|
||
|
<!-- Use, duplication or disclosure restricted by -->
|
||
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
||
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
||
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
||
|
<title>VPN concepts</title>
|
||
|
</head>
|
||
|
<body id="rzajavpnprotocols"><a name="rzajavpnprotocols"><!-- --></a>
|
||
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
||
|
<h1 class="topictitle1">VPN concepts</h1>
|
||
|
<div><p>It is important that you have at least a basic knowledge of standard
|
||
|
VPN technologies. This topic provides you with conceptual information about
|
||
|
the protocols VPN uses in its implementation.</p>
|
||
|
<p>Virtual private networking (VPN) uses several important TCP/IP protocols
|
||
|
to protect data traffic. To better understand how any VPN connection works,
|
||
|
familiarize yourself with these protocols and concepts and how
|
||
|
VPN uses them:</p>
|
||
|
</div>
|
||
|
<div>
|
||
|
<ul class="ullinks">
|
||
|
<li class="ulchildlink"><strong><a href="rzajaipsec.htm">IP Security (IPSec) protocols</a></strong><br />
|
||
|
IPSec provides a stable, long lasting base for providing network layer security.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzajasecassociations.htm">Key management</a></strong><br />
|
||
|
A dynamic VPN provides additional security for your communications by using the Internet Key Exchange (IKE) protocol for key management. IKE allows the VPN servers on each end of the connection to negotiate new keys at specified intervals.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzajal2tpprotocol.htm">Layer 2 Tunnel Protocol (L2TP)</a></strong><br />
|
||
|
Use this information to learn about creating a VPN connection to secure communications between your network and remote clients.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzajal2tp_pres.htm">VPN L2TP Flash Text</a></strong><br />
|
||
|
</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzajavpnnat.htm">Network address translation for VPN</a></strong><br />
|
||
|
VPN provides a means for performing network address translation, called VPN NAT. VPN NAT differs from traditional NAT in that it translates addresses before applying the IKE and IPSec protocols. Refer to this topic to learn more.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzajaudpencap.htm">NAT compatible IPSec with UDP</a></strong><br />
|
||
|
UDP encapsulation allows IPSec traffic to pass through a conventional NAT device. Review this topic for more information about what it is and why you should use it for your VPN connections.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzajaipcomp.htm">IP Compression (IPComp)</a></strong><br />
|
||
|
IPComp reduces the size of IP datagrams by compressing the datagrams to increase the communication performance between two VPN partners.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzajavpnwfilter.htm">VPN and IP filtering</a></strong><br />
|
||
|
IP filtering and VPN are closely related. In fact, most VPN connections require filter rules to work properly. This topic provides you information about what filters VPN requires, as well as other filtering concepts related to VPN.</li>
|
||
|
</ul>
|
||
|
|
||
|
<div class="familylinks">
|
||
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzajagetstart.htm" title="A virtual private network (VPN) allows your company to securely extend its private intranet over the existing framework of a public network, such as the Internet. With VPN, your company can control network traffic while providing important security features such as authentication and data privacy.">Virtual Private Networking (VPN)</a></div>
|
||
|
</div>
|
||
|
</div>
|
||
|
</body>
|
||
|
</html>
|