![background image](http://html.mh-extra.com/html/d-link/cp310-dfl-security-appliance/cp310-dfl-security-appliance_user-manual_75067313.webp)
Overview
Chapter 12
This chapter des
ccess
ient, serv
This chapter includes the following topics:
Overview ...........
....
Setting Up Your Net
Adding and Editi
Deleting a VPN Site .................................................................................340
...................................................340
ite ...............................................341
Re
VPN Site ..................................................345
ertif
..................................................................345
g a Certificate
352
N Tu
..........................353
Viewing IKE Traces for VPN Connections..............................................356
iew
You can configure your NetDefend firewall as part of a virtual private network
VPN
at can
ely connect to each other. Each member of the VPN is called a
VPN site
, and
a connection between two VPN sites is called a
VPN tunnel
. VPN tunnels encrypt
and authenticate
yees
can safely use th
g at home. For
example, they can securely read email, use the company’s intranet, or access the
company’s database from home.
The are four types of VPN sites:
•
Remote Access VPN Server.
Makes a network remotely available to
authorized users, who connect to the Remote Access VPN Server using the
VPNs
Working With
cribes how to use your NetDefend firewall as a Remote A
VPN Cl
er, or gateway.
......................................................
.............................297
Defend firewall as a VPN Server.............................303
ng VPN Sites ................................................................308
Enabling/Disabling a VPN Site .............
Logging on to a Remote Access VPN S
Logging off a
Installing a C
mote Access
icate ............
Uninstallin
Viewing VP
..........................................................................
nnels ...................................................
Overv
(VPN). A
secur
is a private data network consisting of a group of gateways th
all traffic passing through them. Through these tunnels, emplo
eir company’s network resources when workin
Chapter 12: Working With VPNs
297