Version 3R2
Security Appliance User Guide
7-1
V
IRTUAL
P
RIVATE
N
ETWORKS
7
This chapter describes the different modes and configuration options
available for a virtual private network (VPN). This chapter includes the
following topics:
•
Virtual Private Networks
•
Configuring Manual Key VPN Implementations
•
Configuring Internet Key Exchange
•
Advanced VPN Configuration Options
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
V I R T U A L P R I V A T E N E T W O R K S
Businesses can use a Virtual Private Network (VPN) to communicate and
transfer information securely over the Internet. Secure private networks
that use VPN technology provide a low-cost infrastructure, enabling
increased communication for global business. This infrastructure includes
connections for regional offices, branch offices and business partners
(refer to
Figure 7-1
).