Specifications
FRITZ!Box Fon WLAN 7270 162
Security through a VPN
The terminals of the tunnels can be individual computers
or entire networks. For instance, telecommuters or field
staff can connect to the company network via VPN. The lo-
cal network at a branch office can also be connected to
the local network of company headquarters via VPN. Both
of the locations securely connected over VPN must have
an Internet connection at their disposal.
5.2 Security through a VPN
A VPN fulfills the following security requirements for data
transmission:
authenticity
confidentiality
integrity
Authenticity Authenticity ensures that no unauthorized users can ac-
cess the local network via VPN.
It also makes sure that incoming data actually come from
the registered party and not from another source.
Confidentiality Confidentiality requires the nondisclosure of data. Confi-
dentiality can be guaranteed by encrypting the data. En-
cryption means that unauthorized third parties cannot ob-
tain any knowledge about the transmitted data.
Integrity Integrity ensures that the data are not changed, recorded
or diverted during transmission.
TunnelTunnel
Local network A
Local network B
Internet
F!BoxFonWLAN-7270-e.book Seite 162 Donnerstag, 7. April 2011 5:36 17