Netgear RN00RPL1 Replicate for Desktop Software Guide

Page of 36
34
   
|    
Appendix A.  Network Virtualization and Architecture 
 
ReadyNAS Replicate Software Manual 
Figure 3. Connection setup with ReadyNAS Remote
Security
ReadyNAS Replication offers end-to-end security for remote data access, as outlined below:
1. 
ReadyNAS Replication running on the ReadyNAS securely (SSL) authenticates with and 
connects to ReadyNAS Remote server.
2. 
The administrator of the ReadyNAS Replication securely (SSL) logs into the ReadyNAS 
Replication configuration page locally and adds the ReadyNAS to his/her replication 
network.
3. 
Once the devices have authenticated, the ReadyNAS Remote server will send over SSL 
connection, a list of ReadyNAS devices to which are in the Replication administrator's 
network.
4. 
Using the control channel setup with the ReadyNAS Remote server, ReadyNAS sends a 
connection setup request to another ReadyNAS. If the requesting ReadyNAS is in the 
access control list located on the ReadyNAS, the connection setup is allowed to proceed.
5. 
During the connection setup, the ReadyNAS units then exchange 256 AES keys with so that 
the keys are only known by the two endpoints.
6. 
Once the connection is formed, all data is encrypted and transported directly between the 
two endpoints and only the endpoint can decrypt the data.
It is not possible for users or devices that are not in the access control list, or who has not 
been authenticated with the ReadyNAS Remote server can access your ReadyNAS. 
Although ReadyNAS Remote could potentially be used as a VPN connection to your 
ReadyNAS, it is only allowed to transport replication services between your ReadyNAS 
devices; all other ports on the virtual network are blocked.