Virtual
Private Network (VPN) technology is generally used to ensure that employees working
off-site can remotely access their corporate network with appropriate security measures
in place. In general terms, authentication is the process of attempting to verify
the
(digital) identity for both accessing network resources and logging on the VPN network.
VPN leverages existing infrastructure (the Internet) to securely build and enhance
existing connectivity. Based on standard secure Internet protocols, VPN implementation
enables secure links between special types of network nodes, secure gateways.
Site-to-site VPN ensures secure links between gateways. User VPN ensures secure links
between gateways and remote access clients.
A typical Cloud Edge deployment allows users
to remotely connect to the corporate network resources using VPN. Other remote sites
are
guarded by Cloud Edge and strict
security policies regulate communication between all network resources and the remote
endpoint.