VPN Configuration and Management
- Home
- VPN Configuration and Management
VPN Configuration and Management
TechAptiva is a leading company in Kerala to consult for VPN Configuration and Management This company has been providing professional services in the field of VPN Security for many years, and at the same time, it also has a strong technical team who is always committed to product innovation and development.
To connect your instance to external data sources over the Internet, use a virtual private network (VPN).
It is best practice to use the Internet as a transport mechanism when configuring an integration that employs an encrypted protocol, such as Lightweight Directory Access Protocol (LDAP) or HTTPS.
However, security or network architecture needs may necessitate the usage of a site-to-site Internet Protocol Security (IPSEC) Virtual Private Network (VPN) link between your datacenters and your corporate networks. The VPN enables the instance and your network to communicate in an encrypted manner.
Virtual private network (VPN) connections.
Cisco adaptive security appliance (ASA) devices act as VPN termination points in the ServiceNow VPN infrastructure.
To support communications, the VPN between the instance and your network makes use of your current networking hardware. A piece of hardware is not required to be installed. The instance has a flexible VPN solution because each customer’s configuration is different. Checkpoint, Juniper, Nortel, and other IPSEC VPN-capable devices have tunnels built into the instance.
The VPN connections between the instance and your network are set up to allow traffic into your network to be encrypted. Frequently, VPN-based integrations do not include encryption as part of the underlying protocol. For instance, LDAP via the VPN vs. LDAPS over the Internet, and HTTP vs. HTTPS over the Internet.
Any inbound-to-ServiceNow integration or end-user-to-ServiceNow communication cannot be sent through a VPN connection. This restricted communication covers end-user access to the platform, platform administration, web services integrations, and other MID Server-configured integrations. All inbound communication to the instance must be done over HTTPS across the Internet.
This traffic flow’s security requirements are met by the encryption channel and IP access control.