Features
 

Features Description

1. Confidentiality

VPN Authentication

The data is encrypted using a Pre Shared Key (PSK)/Digital Signature delivered via telephone/email respectively for security purposes. It is then encapsulated in an IP packet before being shipped out over the Internet.The process functions like a private tunnel between two devices. Only the two VPN devices can decrypt or encrypt the data packet for delivery. User authentication is used to identify the communicating parties.

User Identification

With this authentication process, a user is presented with a login prompt and required to enter a user name and password based on preshared keys/digital signatures.

Internet Key Exchange Proposals V1/V2 & Encryption

Authentication:
MD5/SHA algorithms are used for tunnel authentication.

Encryption:
AES (128-bit encryption), Triple DES and Diffie Hellman Group 2 are used for tunneling purposes.

IPSEC Lifetime Measurement:
A time slot of 28800 seconds is provided as default for the whole internet key exchange.

2. Integrity

Tunneling

Tunneling is a way of creating a virtual path or point-to-point connection between two hosts on the Internet.

VPN Protocols

IPSec
Its purpose is to ensure data encryption and data integrity. It wraps a packet in an IP header, encrypts the complete IP packet and sends it over the Internet, creating a secure IP tunnel. It uses AES (128 bit) encryption/168-bit Triple-DES encryption.

VPN User Access Controls

Access Control Lists for users are with reference to network/subnet and ports/services.

3. Availability

VPN Platform Performance

  1. End to end redundancy of all devices.
  2. High Availability active/passive arrangement.


 
Features
Benefits
Service Assurance
How it works?
FAQs
 
Why Global Internet Data Center?
 
State-of-the-art facilities
Redundant connectivity
Managed services
Expertise across platforms
Customer care at its best
Strategic alliances