Encryption Domains
Here are examples of ways to set up the architecture of an encryption domain.
Scenario 1: Dedicated Encryption Domain
Component |
Connects To |
---|---|
Gateway of Site 1 |
|
Gateway of Site 2 |
Gateway of Site 1 in Site-to-Site VPN |
Servers in Remote Access Encryption Domain |
Servers in Encryption Domain of Site 2 |
Servers in Remote Access Encryption Domain |
Servers in Encryption Domain of Site 1 |
Remote Access Clients |
|
Scenario 2: Access to External Encryption Domain
Component |
Connects To |
---|---|
Gateway of Site 1 |
|
Gateway of Site 2 |
Gateway of Site 1 in Site-to-Site VPN |
Servers in Remote Access Encryption Domain |
Servers in Encryption Domain of Site 2 |
Servers in Remote Access Encryption Domain |
Servers in Encryption Domain of Site 1 |
Remote Access Clients |
Note - Clients can reach servers of two sites with one authentication session, and their activity in both sites is logged |