2 lancom vpn: an overview, 1 vpn example application – Lancom Systems LCOS 3.50 User Manual

Page 295

Advertising
background image

̈

Chapter 14: Virtual Private Networks—VPN

LANCOM Reference Manual LCOS 3.50

295

V

irt

ua

l Pri

vat

e Ne

two

rks—

VP

N

the Internet. With the proper technology, third parties can monitor and even
record data traffic. As the packets are encrypted by VPN, the actual content of
the packets is inaccessible. Experts compare this state to a tunnel: it's open at
either end, but perfectly shielded in between. Secure connections within
public IP networks are thus also referred to as "tunnels".

.

The goal of modern network structures has thus been achieved: secure
connections via the largest and most low-cost public IP network: the Internet.

14.2

LANCOM VPN: an overview

14.2.1

VPN example application

VPN connections are used in many different fields of application. In most
cases, a variety of communications technologies is used for transferring both
data and audio, and VPN unites these systems into an integrated network. The

Internet

VPN tunnel

Advertising