A Virtual Private Network (VPN) is used to transfer sensitive information across the Internet in a secure fashion by encapsulating and encrypting the data. A VPN can also be deployed in intranets where data security is required between departments.
The Novell BorderManager 3.8 VPN features, including integration with Novell eDirectory, give remote and mobile employees secure access to network resources they are entitled to use. This means that they can enjoy direct, secure access to all the services such as file, print, and e-mail applications they need, from wherever they're working.
Novell BorderManager 3.8 supports open standards and authenticates the users with any fully compliant Lightweight Directory Access Protocol (LDAP) directory or Novell eDirectory. Novell BorderManager 3.8 traffic rules enable you to manage users' access at a granular level by client-to-site or site-to-site service, node, network address, and more.
For greater authentication flexibility in this release of Novell BorderManager 3.8, the BorderManager Authentication Services (BMAS) authentication is replaced with Novell Modular Authentication Services (NMASTM) mechanism. Novell BorderManager supports more than 50 advanced authentication methods. As a result, your mobile employees can use tokens, smart cards, X.509 certificates, and other supported methods-alone or in combination-to securely access data via the VPN. Novell BorderManager 3.8 can interoperate with third-party servers using standard based protocols such as IKE and IPsec.
The following sections of the Novell® BorderManager® 3.8 Installation and Administration guide provide information on how to set up and use VPN. Novell BorderManager 3.8 provides an entirely new iManager-based VPN configuration.
For more information on some of the terms used in this section refer to the Glossary at the end of this book.