Remote AccessVPNsVPN BasicsTunneling ProtocolsPPPPPTPL2TPL2FLAN-to-LAN VPNAuthenticationPPTP-PAP/CHAPDigital CertificatesSmart CardsHardware Tokens/PKCS #11Lightweight Directory Access Protocol (LDAP)RADIUS ServersTACACS+++ (Terminal Access Controller Access Control System Plus)Encryption AlternativesPretty Good Privacy (PGP)PKIMD5 (Message Digest 5)IPSecInternet Key Exchange (IKE)VPN Products: Gateways, Clients, and ApplicationsCommon Criteria (CC) for Information Technology SecurityCC Protection ProfilesEnterprise Assurance LevelsTelecommunications Access Methods to a Local ISPPOTS Dial-UpISDNCable ModemsDigital Subscriber Line (DSL)Policy and Administrative ManagementCentralized Security ManagementWorst-Case ScenarioBackup/Restore ProceduresSecurity PolicyKey ManagementVPN Network RequirementsNetwork ArchitectureFirewall-Based VPNsBlack-Box-Based VPNsRouter-Based VPNsRemote Access-Based VPNsRemote Access VPN Network DesignNetwork Access PointsDynamic Protocol SupportIP Service RequirementsExisting Routers, Firewalls, and Proxy ServersTypes of Applications That Cross VPN BoundariesBandwidth RequirementsCryptographic Processing Requirements on Servers and DesktopsSupport Personnel RequirementsFuture Network PlansScalability of Critical DevicesSecurity PolicyVPN User-Access RequirementsRemote Office LocationsNSP or ISP RequirementsVPN Performance RequirementsCryptographic Hardware Accelerator SupportClustering of Servers for ScalabilitySLAsNetwork UptimeBandwidthLatencyFailover to Redundant DevicesVPN Client Essentials, Security Guidelines, and VulnerabilitiesWindows 9x (95/98)Windows 9x Security GuidelinesWindows 9x VulnerabilitiesUNIXWindows NTWindows NT Security GuidelinesWindows NT VulnerabilitiesDHCP SupportSecurity PolicySummary