Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

VPN

Firewall devices at the edge of a network are sometimes required to do more than block unwanted
traffic. A common requirement for these firewalls is to encrypt and decrypt specific network traffic
flows between the protected network and external networks. This nearly always involves virtual
private networks (VPN), which use additional protocols to encrypt traffic and provide user
authentication and integrity checking. VPNs are most often used to provide secure network
communications across untrusted networks.

You might also like