Professional Documents
Culture Documents
5
5
Firewall devices at the edge of a network are sometimes required to do more than block unwanted
traffic. A common requirement for these firewalls is to encrypt and decrypt specific network traffic
flows between the protected network and external networks. This nearly always involves virtual
private networks (VPN), which use additional protocols to encrypt traffic and provide user
authentication and integrity checking. VPNs are most often used to provide secure network
communications across untrusted networks.