VPN Deployment Models and Architecture

One of the first decisions you face when deploying a VPN is determining which device will serve as the termination point of the secured tunnel. You have several options, but often the decision rests on where in the network infrastructure you want to position the tunnel endpoint. The features the VPN device provides may be a factor in the decision.

Such factors include deciding which devices have sufficient processing power to maintain wire speed, even with heavy traffic and complex encryption. Another concern is whether network address translation (NAT) is present, as this can impose problems for tunnel-mode encryption.

VPN Deployment Models

A hardware VPN uses a dedicated device to perform VPN functions ...

Get Network Security, Firewalls, and VPNs, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.