User guide

User Guide 93
CHAPTER 8 Configuring Virtual
Private Networks
A
virtual private network
(VPN) allows secure connections between
computers or networks in separate physical locations. The networks
and hosts at the endpoints of a VPN are typically corporate headquar-
ters, branch offices, remote users, telecommuters, and traveling
employees. User authentication verifies the identity of both the sender
and the receiver. Data sent by way of the Internet is encrypted such
that only the sender and the receiver of the message can see it in a
clearly readable state.
What You Need to Create a VPN
Two properly configured and working Firebox® X Edges or one
Firebox X Edge and another IPSec-compliant device such as a
Firebox X. Each Firebox X Edge must have the VPN option
enabled.