[A] [B] [C] [D] [E] [F] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] HA (high-avaliability) hackers reconnaisance hardware 3002 VPN Hardware Client 2nd assets 2nd 3rd 4th 5th VPN clients headend remote users 2nd SMR headends medium networks design 2nd HIDS configuring 2nd HIDS (host IDS) high avaliability VPNs high-availability (HA) hijacking sessions homogeneous deployments VPNs host IDS (HIDS) hosts as targets |