3.5 Virtual Hub Security Features

    Table of contents
    You are currently comparing two old versions - only when you are comparing against the latest version can you revert. Return to version archive.

    Combined revision comparison

    Comparing version 18:32, 4 Mar 2013 by yagi with version 22:04, 22 Apr 2014 by yamame.

    ...

    Using the "IP access control list" makes it possible to allow or deny a VPN source computer attempting to make a VPN connection to a Virtual Hub depending on the computer's physical IP network address.

    Although the "The IP access control list" is similar to the "access list"accesslist in terms of its name and settings ,these two are completely different. While the "access list"but the two differ completely by nature. While the access list controls IP packets flowing in a Virtual Hub using their IP addresses, protocol port numbers and so on, the "IP access control list" is used to refine the physical IP addresses of connection sources which can make a VPN connection to the Virtual Hub.

    This may involve, for instance, setting up a permanent cascade connection to the VPN server from the VPN Bridge of a separate hub when connecting company sites to the VPN. However, where security concerns exist, it is possible to set the "IP access control list" of the Virtual Hub receiving the VPN Server cascade connection to refuse any VPN connections to the Virtual Hub other than from the physical IP address of the site in which the VPN Bridge is set up. Put simply, it is possible to perform authentication based on the connection source's IP address. This significantly enhances security because it prevents connection source VPN client computers which are denied based on their source IP address from proceeding even to the user authentication phase.

    ...

    Multiple rules can be added to the "IP access control list",, and the values which can be defined in these rules are as follows.

    ...

    Version from 18:32, 4 Mar 2013

    This revision modified by yagi (Ban)

    ...

    The IP access control list is similar to the access list in terms of its name and settings but the two differ completely by nature. While the access list controls IP packets flowing in a Virtual Hub using their IP addresses, protocol port numbers and so on, the IP access control list is used to refine the physical IP addresses of connection sources which can make a VPN connection to the Virtual Hub.

    ...

    Multiple rules can be added to the IP access control list, and the values which can be defined in these rules are as follows.

    ...

    Version as of 22:04, 22 Apr 2014

    This revision modified by yamame (Ban)

    ...

    Using the "IP access control list" makes it possible to allow or deny a VPN source computer attempting to make a VPN connection to a Virtual Hub depending on the computer's physical IP network address.

    Although the "IP access control list" is similar to the "access list" in terms of its name and settings,these two are completely different. While the "access list" controls IP packets flowing in a Virtual Hub using their IP addresses, protocol port numbers and so on, the "IP access control list" is used to refine the physical IP addresses of connection sources which can make a VPN connection to the Virtual Hub.

    This may involve, for instance, setting up a permanent cascade connection to the VPN server from the VPN Bridge of a separate hub when connecting company sites to the VPN. However, where security concerns exist, it is possible to set the "IP access control list" of the Virtual Hub receiving the VPN Server cascade connection to refuse any VPN connections to the Virtual Hub other than from the physical IP address of the site in which the VPN Bridge is set up. Put simply, it is possible to perform authentication based on the connection source's IP address. This significantly enhances security because it prevents connection source VPN client computers which are denied based on their source IP address from proceeding even to the user authentication phase.

    ...

    Multiple rules can be added to the "IP access control list", and the values which can be defined in these rules are as follows.

    ...