Abstract :
By placing the security processors directly in the data path to secure traffic without the aid of additional outside devices or software, the flow-through security device creates a virtual private network that maximizes network processing unit host offload with minimal system integration effort. A virtual private network uses the Internet protocol security (IPsec) framework to provide confidentiality, data integrity, and end point authentication. These features protect corporate data from being viewed or tampered with while in transit over the Internet. Additionally, the VPN supports data compression, which increases Internet performance between sites. Metropolitan area networks and storage area networks lead the trend toward gigabit Ethernet installations that seek to provide higher speed and better security. The decreasing cost of gigabit devices and their increasing availability in PCs are driving the use of gigabit MAN, while increasing data rates drive the use of gigabit SANs as the bit rate to hard-disk media approaches 1 gigabit per second.
Keywords :
IP networks; data integrity; message authentication; metropolitan area networks; storage area networks; telecommunication security; virtual private networks; Ethernet installation; Internet protocol security framework; data integrity; end point authentication; hard-disk media approach; metropolitan area network; security processor; storage area network; virtual private network; Authentication; Computer architecture; Data compression; Data security; IP networks; Internet; Protection; Protocols; Telecommunication traffic; Virtual private networks;