|
In this chapter, we examined the topic of VPN integration, and you learned how VPN technologies can be integrated with other defense components. The potential VPN methods we reviewed include standard SSH and SSL connections, SSH and SSL tunneling, SSL proxy servers, remote desktop software, and IPSec. Each of these types has advantages and disadvantages, of course, and each is best suited to certain types of usage. To choose the best solution, you must consider several factors, including the characteristics of end users and their systems, which applications will be used, and what effect everything will have on perimeter defenses. By gathering and evaluating all the pertinent information on the need for a VPN, you can choose an optimal method that secures your organization's data and resources. |
|