Virtual Private Networks (VPNs)
Chapter 10
Virtual Private Networks (VPNs)
The Netopia 4553 offers IPsec, PPTP, and ATMP tunneling support for Virtual Private Networks (VPN).
The following topics are covered in this chapter:
■"Overview" on page
■"About PPTP Tunnels" on page
■"About IPsec Tunnels" on page
■"About ATMP Tunnels" on page
■"Encryption Support" on page
■"ATMP/PPTP Default Profile" on page
■"VPN QuickView" on page
■
■"Installing the VPN Client" on page
■"Allowing VPNs through a Firewall" on page
Overview
When you make a long distance telephone call from your home to a relative far away, you are creating a private network. You can hold a conversation, and exchange information about the happenings on opposite sides of the state, or the continent, that you are mutually interested in. When your next door neighbor picks up the phone to call her daughter at college, at the same time you are talking to your relatives, your calls don't overlap, but each is separate and private. Neither house has a direct wire to the places they call. Both share the same lines on the telephone poles (or underground) on the street.
These calls are virtual private networks. Virtual, because they appear to be direct connections between the calling and answering parties, even though they travel over the public wires and switches of the phone company; private, because neither pair of calling and answering parties interacts with the other; and networks, because they exchange information.
Computers can do the same thing; it's called Virtual Private Networks (VPNs). Equipped with a Netopia 4553, a single computer or private network (LAN) can establish a private connection with another computer or private network over the public network (Internet).
The Netopia 4553 can be used in VPNs either to initiate the connection or to answer it. When used in this way, the routers are said to be tunnelling through the public network (Internet). The advantages are that, like your long distance phone call, you don't need a direct line between one computer or LAN and the other, but use the local connections, making it much cheaper; and the information you exchange through your tunnel is private and secure.