Home > M48 > M48Z18-100PC1
M48Z18-100PC1 Datasheet | STMicroelectronics
Part No. : M48Z18-100PC1
Description : 64 Kbit 8Kb x 8 ZEROPOWER SRAM
Download : M48Z18-100PC1 Click to Download
Page Number : 18
Manufacturer : STMicroelectronics
File Size : 141 Kb

M48Z18-100PC1 Article About

Compared to traditional IPSec VPN, SSL allows companies to achieve more remote users access at different locations to achieve greater access to network resources, and low demand on the client device, thereby reducing the configuration and operation support costs. Many corporate users to adopt as a remote secure access SSL VPN technology, the main value is its access control functions. SSL VPN provides enhanced security for remote access features. IPSec VPN between two sites created by the tunnel to provide direct access to achieve transparent access to the entire network; Once the tunnel created, the user physically at the PC just as in the enterprise LAN. This brings a lot of security risks, especially in the access user rights situation is too large. SSL VPN to provide secure, proxy connection, and only authenticated users can access resources, which safer. SSL VPN encrypted tunnel can be broken down, allowing end users to simultaneously access Internet and access to internal corporate network resources, which means that it has the control function. In addition, SSL VPN can also refine the access control function, easy to give different users different access rights, access to achieve scalability; this exact access control for remote access IPSec VPN, it is almost impossible to achieve.
During the design of enterprise network security, we must first understand their networks may face attack. In the network, different types of risks faced by enterprises is not the same, each company has its own unique vulnerabilities and security risks. As the enterprise network and gradually extended to suppliers, customers and partners, external threats are becoming increasingly serious. Mainly refers to external threats: unauthorized users, such as hacking, theft, malicious destroyer or network elements such as the destruction of the system; on corporate mismanagement of former employees, so that even after they leave the company to access the corporate network, a threat; addition , companies must also consider the result of equipment failure and natural disasters such as fire and other dangers.

All rights reserved:iceach.com © 2000-2010 Certificate No.:Guangdong ICP No.08108781