O'Reilly logo

Microsoft® Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant by Jason Ballard, Bud Ratliff

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Securing Virtual Private Network Access

Virtual private networking allows you to create a protected connection across an untrusted network—most often the Internet—from either a client connecting into a private network, or connecting two separate networks together in a site-to-site configuration. We discuss how to prepare for, configure, and set up virtual private networks (VPNs) in a remote access configuration, and a site-to-site configuration. We then conclude with information about using VPN Quarantine to protect your network from vulnerable machines.

Remote Access Configuration

A remote access configuration allows clients located outside of your protected network to securely connect across the Internet (or other untrusted networks). ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required