|
|
|
|
|
|
|
|
Features |
Description |
1. Confidentiality |
VPN Authentication |
The data is encrypted using a Pre Shared Key (PSK)/Digital Signature delivered via telephone/email respectively for security purposes. It is then encapsulated in an IP packet before being shipped out over the Internet.The process functions like a private tunnel between two devices. Only the two VPN devices can decrypt or encrypt the data packet for delivery. User authentication is used to identify the communicating parties. |
User Identification |
With this authentication process, a user is presented with a login prompt and required to enter a user name and password based on preshared keys/digital signatures. |
Internet Key Exchange Proposals V1/V2 & Encryption |
Authentication:
MD5/SHA algorithms are used for tunnel authentication.
Encryption:
AES (128-bit encryption), Triple DES and Diffie Hellman Group 2 are used for tunneling purposes.
IPSEC Lifetime Measurement:
A time slot of 28800 seconds is provided as default for the whole internet key exchange. |
2. Integrity |
Tunneling |
Tunneling is a way of creating a virtual path or point-to-point connection between two hosts on the Internet.
VPN Protocols
IPSec
Its purpose is to ensure data encryption and data integrity. It wraps a packet in an IP header, encrypts the complete IP packet and sends it over the Internet, creating a secure IP tunnel. It uses AES (128 bit) encryption/168-bit Triple-DES encryption. |
VPN User Access Controls |
Access Control Lists for users are with reference to network/subnet and ports/services. |
3. Availability |
VPN Platform Performance |
- End to end redundancy of all devices.
- High Availability active/passive arrangement.
|
|
|
|
|
|
Why Global Internet Data Center? |
|
State-of-the-art facilities |
 |
Redundant connectivity |
 |
Managed services |
 |
Expertise across platforms |
 |
Customer care at its best |
 |
Strategic alliances |
|
|
|
|
|
|
|