Справочник Пользователя для Netopia ISDN Router

Скачать
Страница из 276
Virtual Private Networks (VPN)   10-1
C
C
C
Ch
h
h
haa
a
ap
p
p
pttttee
e
errrr    11110
0
0
0
V
V
V
Viiiirrrrttttu
u
u
uaa
a
allll    P
P
P
Prrrriiiivvv
vaa
a
attttee
e
e    N
N
N
Nee
e
ettttw
w
w
wo
o
o
orrrrkk
k
kssss    ((((V
V
V
VP
P
P
PN
N
N
N))))
The Netopia R310 Router offers both PPTP and ATMP tunneling suppor t for Vir tual Private Networks (VPN). 
Note: VPN is an optional add-on to the Netopia R310.  Order TER/VPN2 from the Netopia Web site at 
www.netopia.com or from your Netopia reseller.
The following topics are covered in this chapter:
O
O
O
Ovvv
vee
e
errrrvvv
viiiiee
e
ew
w
w
w
When you make a long distance telephone call from your home to a relative far away, you are creating a private 
network. You can hold a conversation, and exchange information about the happenings on opposite sides of the 
countr y, or the continent, that you are mutually interested in. When your next door neighbor picks up the phone 
to call her daughter at college, at the same time you are talking to your relatives, your calls don't overlap, but 
each is separate and private. Neither house has a direct wire to the places they call. Both share the same lines 
on the telephone poles (or underground) on the street.
These calls are vir tual private networksVir tual, because they appear to be direct connections between the 
calling and answering par ties, even though they travel over the public wires and switches of the phone 
company; private, because neither pair of calling and answering par ties interacts with the other; and networks
because they exchange information.
Computers can do the same thing; it's called Vir tual Private Networks (VPNs). Equipped with Netopia R310s, a 
single computer or private network (LAN) can establish a private connection with another computer or private 
network over the public network (Internet).
The Netopia R310 can be used in VPNs either to initiate the connection or to answer it. When used in this way, 
the routers are said to be tunnelling through the public network (Internet). The advantages are that, like your 
long distance phone call, you don't need a direct line between one computer or LAN and the other, but use the 
local connections, making it much cheaper; and the information you exchange through your tunnel is private and 
secure.