Summary


In this chapter, we examined the topic of VPN integration, and you learned how VPN technologies can be integrated with other defense components. The potential VPN methods we reviewed include standard SSH and SSL connections, SSH and SSL tunneling, SSL proxy servers, remote desktop software, and IPSec. Each of these types has advantages and disadvantages, of course, and each is best suited to certain types of usage. To choose the best solution, you must consider several factors, including the characteristics of end users and their systems, which applications will be used, and what effect everything will have on perimeter defenses. By gathering and evaluating all the pertinent information on the need for a VPN, you can choose an optimal method that secures your organization's data and resources.



    Inside Network Perimeter Security
    Inside Network Perimeter Security (2nd Edition)
    ISBN: 0672327376
    EAN: 2147483647
    Year: 2005
    Pages: 230

    Similar book on Amazon

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net