I
NTRODUCTION
1-4
Virtual Private Network (VPN)
The Barricade supports three of the most commonly used VPN
protocols — PPTP, L2TP, and IPSec. These protocols allow remote
users to establish a secure connection to their corporate network. If
your service provider supports VPNs, then these protocols can be
used to create an authenticated and encrypted tunnel for passing
secure data over the Internet (i.e., a traditionally shared data network).
The VPN protocols supported by the Barricade are briefly described
below.
Point-to-Point Tunneling Protocol — Provides a secure tunnel
for remote client access to a PPTP security gateway. PPTP
includes provisions for call origination and flow control required
by ISPs.
L2TP merges the best features of PPTP and L2F — Like PPTP,
L2TP requires that the ISP’s routers support the protocol.
IP Security — Provides IP network-layer encryption. IPSec can
support large encryption networks (such as the Internet) by using
digital certificates for device authentication.