Read more from Live Expert Q&A guest Lisa Phifer

We are occasionally lucky enough to have Lisa Phifer, vice president of Core Competence Inc., as a guest speaker at our Live Expert Q&As. Lisa teaches about VPNs at the annual Internet Security Conference and writes frequently about network and security technologies, including a VPN column published monthly by ISP-Planet. Here you can read some of those columns and other related articles authored by Lisa:

    Requires Free Membership to View

VPN: Virtually Anything?
Before you can tackle the security issues surrounding your VPN and its remote users, you need to understand which type of VPN you have and how it works. This white paper explains secure VPNs and their applications, the technology that supports them, and how they are deployed. Helpful diagrams illustrate the concepts.
Source: Core Competence

The Remote Access Conundrum Part 1: Extended Authentication
Can ISPs offer IPsec-based remote access VPNs without the expense of building (or buying) a PKI? In this ISP-Planet column, we consider hybrid authentication, one approach for integrating legacy authentication into IPsec-based VPNs. (November 30, 2000)
Source: ISP-Planet

The Remote Access Conundrum Part 2: Tunneling At Layer Two
To offer a successful remote access VPN service, an ISP must master many challenges, ranging from trouble-free client software to user database integration. In this column, we examine layer two L2TP and L2F options. (December 22, 2000)
Source: ISP-Planet

Remote Access Conundrum Part 3: Dynamic Addressing
The purpose of a remote access VPN is to make the teleworker or traveler feel as though he or she were directly connected to the corporate LAN. This requirement may seem obvious, but satisfying it can be a challenge. In this column, we discuss how VPNs can be designed to provide clients with "virtual presence." (February 8, 2001)
Source: ISP-Planet

Remote Access Conundrum Part 4: VPN Client Administration
Here, we open Pandora's box: VPN client administration. Distributing software, configuring it properly, and keeping it up-to-date is a time-consuming, never-ending chore. Why should remote access VPN clients be any different? (March 15, 2001)
Source: ISP-Planet

Securing Residential Broadband Connections: Personal Firewall Approach
Broadband providers such as EarthLink, Excite@Home, Prodigy, and BroadView are providing residential subscribers with personal firewalls. In this column, we discuss the importance of securing residential PCs which operate as remote access tunnel endpoints. (August 28, 2000)
Source: CLEC-Planet

Adding Public Key Infrastructure to VPNs
Many of today's VPNs exist without the support of a public key infrastructure. Rudimentary preshared secrets work fine on a small scale, but become unwieldy in larger VPNs, especially large remote access VPNs with hundreds or thousands of clients. In this column, we provide an introduction to PKI and how it impacts VPN deployment. (May 2, 2000)
Source: ISP-Planet

Windows 2000's VPN-Related Security Issues
Windows 2000 includes plenty of new security features -- including embedded protocol support which both simplifies and complicates remote access VPNs. This column provides an overview of Windows 2000 security enhancements and discusses the impact on multi-vendor remote access. (March 27, 2000)
Source: ISP-Planet

SLAs Meet Managed VPNs
Guaranteed service levels for VPN and other managed security services are starting to emerge. In this column, we survey service level agreements (SLAs) offered by managed VPN providers. (April 5, 2000)
Source: ISP-Planet

Extending Dial Access Reach: The Key To Unlocking VPN ROI
The ROI in remote access VPN is in reducing telco charges. Offering ubiquitous, low-cost access helps build a market for managed VPN services. In this ISP-Planet column, we take a look at how enterprises can accomplish this goal, and the ISP revenue opportunities these options represent. (January 6, 2000)
Source: ISP-Planet

Protocols for Remote Access VPN Services
If the distinctions between the many types of VPN tunneling protocols aren't crystal clear to you, you're not alone. We provide an overview of tunneling protocols for remote access in this ISP-Planet column. (October 6, 1999)
Source: ISP-Planet

Dial VPNs: Revenue Opportunity or Headache?
Choosing the best way to offer a dial VPN service is a complex equation of technologies, protocols, and topologies, with no one-size-fits-all solution. How can ISPs improve dial VPN service uptake by minimizing impact on end users? Read about client-side strategies in this column published by ISP-Planet. (May 1999)
Source: ISP-Planet

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: