User manual MAXTOR VPN8

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual MAXTOR VPN8. We hope that this MAXTOR VPN8 user guide will be useful to you.

Lastmanuals help download the user guide MAXTOR VPN8.


Mode d'emploi MAXTOR VPN8
Download
Manual abstract: user guide MAXTOR VPN8

Detailed instructions for use are in the User's Guide.

[. . . ] Since data flows over a public network, such as the Internet, encryption technology protects the data. Only networking equipment that contains the correct algorithms and the correct decoding keys could read the data that the VPN transfers over the public network. Since the decoding keys are user configurable, administrators are able to create VPNs. [. . . ] In the case of encryption, the Matrox iSwitch makes no distinction between transmission and reception since it uses the same algorithm and keys for a given tunnel. The Matrox iSwitch encrypts transmitted data before it encapsulates. Decryption occurs once the Matrox iSwitch removes the encapsulation from the original packet. Example: To clarify this process, an example based upon Figure 1 follows. Assume that we will follow a packet as it goes from client A on LAN 1 to client B on LAN 3. The sequence of events is as follows: 1. Client A (192. 168. 18. 9) on LAN 1 builds a packet to send to Client B (192. 168. 20. 5) on LAN 3. The packet arrives at the default gateway of client A: Matrox iSwitch # 1 at 192. 168. 18. 120. Matrox iSwitch #1 recognizes that the destination Subnet ID of the packet exists in its VPN table. The VPN table indicates that it is destined for LAN 3 with a corresponding Internet destination address of 132. 11. 1. 12. The entry also indicates the encryption parameters the Matrox iSwitch should use. Matrox iSwitch #1 encrypts the complete packet. It then encapsulates the result in a new packet with a destination IP address of 132. 11. 1. 12, a source IP address of 200. 200. 10. 1, and a setting to indicate that the payload contains a Generic Routing Encapsulation (GRE) packet. Matrox iSwitch #1 ships this packet across a WAN port to the ISP. The packet is routed through the Internet to eventually arrive at Matrox iSwitch #3. c. Matrox Networks 1998 TechNote #8 - VPN Page 3 of 4 6. Matrox iSwitch #3 inspects the received packet and notes that it contains a GRE packet. It then extracts the source IP address of 200. 200. 10. 1 and looks for a matching entry in its VPN table. [. . . ] To ensure that the VPN is not deprived of bandwidth non-mission critical applications (WWW, FTP, E-Mail, . . . ), configure a WAN access port to be dedicated exclusively to VPN. The Random key generation feature is useful for creating a password but this password must be sent to the peer endpoint on the other side of the tunnel (they must be the same). While you can accomplish this through a telephone communication, we suggest that you obtain a secure E-mail program. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE MAXTOR VPN8

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual MAXTOR VPN8 will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag