Requires Free Membership to View
Before you can tackle the security issues surrounding your VPN and its remote users, you need to understand which type of VPN you have and how it works. This white paper explains secure VPNs and their applications, the technology that supports them, and how they are deployed. Helpful diagrams illustrate the concepts.
Source: Core Competence The Remote Access Conundrum Part 1: Extended Authentication
Can ISPs offer IPsec-based remote access VPNs without the expense of building (or buying) a PKI? In this ISP-Planet column, we consider hybrid authentication, one approach for integrating legacy authentication into IPsec-based VPNs. (November 30, 2000)
Source: ISP-Planet The Remote Access Conundrum Part 2: Tunneling At Layer Two
To offer a successful remote access VPN service, an ISP must master many challenges, ranging from trouble-free client software to user database integration. In this column, we examine layer two L2TP and L2F options. (December 22, 2000)
Source: ISP-Planet Remote Access Conundrum Part 3: Dynamic Addressing The purpose of a remote access VPN is to make the teleworker or traveler feel as though he or she were directly connected to the corporate LAN. This requirement may seem obvious, but satisfying it can be a challenge. In this column, we discuss how VPNs can be designed to provide clients with "virtual presence." (February 8, 2001)
Source: ISP-Planet Remote Access Conundrum Part 4: VPN Client Administration
Here, we open Pandora's box: VPN client administration. Distributing software, configuring it properly, and keeping it up-to-date is a time-consuming, never-ending chore. Why should remote access VPN clients be any different? (March 15, 2001)
Source: ISP-Planet Securing Residential Broadband Connections: Personal Firewall Approach
Broadband providers such as EarthLink, Excite@Home, Prodigy, and BroadView are providing residential subscribers with personal firewalls. In this column, we discuss the importance of securing residential PCs which operate as remote access tunnel endpoints. (August 28, 2000)
Source: CLEC-Planet Adding Public Key Infrastructure to VPNs
Many of today's VPNs exist without the support of a public key infrastructure. Rudimentary preshared secrets work fine on a small scale, but become unwieldy in larger VPNs, especially large remote access VPNs with hundreds or thousands of clients. In this column, we provide an introduction to PKI and how it impacts VPN deployment. (May 2, 2000)
Source: ISP-Planet Windows 2000's VPN-Related Security Issues
Windows 2000 includes plenty of new security features -- including embedded protocol support which both simplifies and complicates remote access VPNs. This column provides an overview of Windows 2000 security enhancements and discusses the impact on multi-vendor remote access. (March 27, 2000)
Source: ISP-Planet SLAs Meet Managed VPNs
Guaranteed service levels for VPN and other managed security services are starting to emerge. In this column, we survey service level agreements (SLAs) offered by managed VPN providers. (April 5, 2000)
Source: ISP-Planet Extending Dial Access Reach: The Key To Unlocking VPN ROI
The ROI in remote access VPN is in reducing telco charges. Offering ubiquitous, low-cost access helps build a market for managed VPN services. In this ISP-Planet column, we take a look at how enterprises can accomplish this goal, and the ISP revenue opportunities these options represent. (January 6, 2000)
Source: ISP-Planet Protocols for Remote Access VPN Services
If the distinctions between the many types of VPN tunneling protocols aren't crystal clear to you, you're not alone. We provide an overview of tunneling protocols for remote access in this ISP-Planet column. (October 6, 1999)
Source: ISP-Planet Dial VPNs: Revenue Opportunity or Headache?
Choosing the best way to offer a dial VPN service is a complex equation of technologies, protocols, and topologies, with no one-size-fits-all solution. How can ISPs improve dial VPN service uptake by minimizing impact on end users? Read about client-side strategies in this column published by ISP-Planet. (May 1999)
Source: ISP-Planet
Network Management Strategies for the CIO

Join the conversationComment
Share
Comments
Results
Contribute to the conversation