Linksys WAG54GP2 manual Why do I need a VPN?, VPN Gateway to VPN Gateway

Models: WAG54GP2

1 137
Download 137 pages 48.41 Kb
Page 13
Image 13

Wireless-G ADSL Gateway with 2 Phone Ports

VPN Gateway to VPN Gateway

An example of a VPN Gateway-to-VPN Gateway VPN would be as follows. At home, a telecommuter uses his VPN Gateway for his always-on Internet connection. His Gateway is configured with his office's VPN settings. When he connects to his office's Gateway, the two Gateways create a VPN tunnel, encrypting and decrypting data. As VPNs utilize the Internet, distance is not a factor. Using the VPN, the telecommuter now has a secure connection to the central office's network, as if he were physically connected.

For additional information and instructions about creating your own VPN, please visit Linksys’s website at

www.linksys.com or refer to Appendix C: Configuring IPSec between a Windows 2000 or XP computer and the

VPN Gateway.

Why do I need a VPN?

With the flexibility that comes with computer networking, there is also an increased risk in security. This is why firewalls were first introduced. Firewalls help to protect data inside of a local network. But what do you do once information is sent outside of your local network, when emails are sent to their destination, or when you have to connect to your company's network when you are out on the road? How is your data protected?

That is when a VPN can help. VPNs secure data moving outside of your network as if it were still within that network.

When data is sent out across the Internet from your computer, it is always open to attacks. You may already have a firewall, which will help protect data moving around or held within your network from being corrupted or

intercepted by entities outside of your network, but once data moves outside of your network - when you sendFigure 1-3: VPN Gateway-to-VPN Gateway data to someone via email or communicate with an individual over the Internet - the firewall will no longer protect

that data.

At this point, your data becomes open to hackers using a variety of methods to steal not only the data you are transmitting but also your network login and security data. Some of the most common methods are as follows:

1) MAC Address Spoofing

Packets transmitted over a network, either your local network or the Internet, are preceded by a packet header.

These packet headers contain both the source and destination information for that packet to transmit efficiently.

A hacker can use this information to spoof (or fake) a MAC address allowed on the network. With this spoofed

MAC address, the hacker can also intercept information meant for another user.

Chapter 1: Planning Your Network

4

Why do I need a VPN?

Page 13
Image 13
Linksys WAG54GP2 manual Why do I need a VPN?, VPN Gateway to VPN Gateway