Virtual
Private Network (VPN) technology is generally used to ensure that employees working
off-site can remotely access their corporate network with appropriate security measures
in place. In general terms, authentication is the process of attempting to verify
the
(digital) identity for both accessing network resources and logging on the VPN network.
VPN leverages existing infrastructure (the Internet) to securely build and enhance
existing connectivity. Based on standard secure Internet protocols, VPN implementation
enables secure links between special types of network nodes, secure gateways.
Site-to-site VPN ensures secure links between gateways. User VPN ensures secure links
between gateways and remote access clients.
A typical Deep Edge deployment allows users
to remotely connect to the corporate network resources using VPN. Other remote sites
are
guarded by Deep Edge and strict
security policies regulate communication between all network resources and the remote
endpoint.
Deep Edge supports IPV4-to-IPV4 VPN
access.