Nortel Networks 380 Switch Switch User Manual


 
• Secure IPSec tunnels are initiated between the
user and the core Contivity
• Contivity authentication tunnel initiation request
against local data stores – may be RADIUS from
old RAS infrastructure, LDAP etc.
• Secure IPSec tunnels encrypt and encapsulate
traffic between the user and the Contivity
• Firewalls in each Contivity switch protect the site
LAN from outside threats
• Split-tunneling on the IPSec client protects
customer’s machine from outside threats while
tunnel is up
Solution Value Proposition
• Reduces corporate remote access expenses
by 60-80%
• Accommodates an increasing dispersed and
mobile workforce, estimated to be 83% of all
employees by 2003
• Gain anywhere access with minimal
access charges
• Reduces ongoing expense of dial access
• Eliminates costly toll-free access numbers
• Eliminates dedicated RAS infrastructure
• Secures access from anywhere where the
Internet is
• Allows use of broadband access, increasing
productivity
• More effective use of work at home models
• Increases geographic coverage
For further information contact your local
Nortel Networks Representative
226
Remote Access IP-VPN Solution