Page 58 - 2023-ORing_Guidebook-ok(電子書轉檔用)
P. 58
Industrial Cellular VPN Overview
ORing's wired, wireless, and wireless EN50155 Industrial Cellular VPN Routers are reliable and cost-effective routers
for redirecting wired or wireless network connections to wired or wireless 3.5G modems – very useful for mobile
internet connection.
All of ORing's industrial Cellular VPN Routers feature highly advanced security features for internet connection. The
wireless models, with support of IEEE 802.11 wireless standard, additionally feature long communication range.
Additionally, there are EN50155-certified Transporter series wireless models, making them espcially suitable for
rolling stock applications.
Key Technologies
SSL VPN
Technology Description
Secure Sockets Layer virtual private network (SSL VPN) is a kind of VPN that runs on Secure Socket Layers technology
and is accessible via https over web browsers. It permits users to establish safe and secure remote access sessions from
any Internet connected browser. SSL functions between the Transmission Control Protocol (TCP) layer and application
layer protocols. Traditional VPN requires the installation of IPsec client software on a client machine before a connection
is established whereas SSL VPN has no such requirement. Corporate users are able to access confidential applications or
share files on standard web browsers.
SSL VPN Benefits
The main benefit of SSL VPN technology is that since it is user-based, not device-based. Any authorized user can login
from web-enabled PCs for secure, remote access of confidential files. The safety issues are similar to SSL-based credit
card online transactions through standard web browsers.
IPsec VPN
Technology Description
Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating
and encrypting each IP packet of a data stream. IPsec also includes protocols for establishing mutual authentication
between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.
IPsec can be used to protect data flows between a pair of hosts (e.g. computer users or servers), between a pair of
security gateways (e.g. routers or firewalls), or between a security gateway and a host.
56