VPN Deployment Models and Architecture

One of the first decisions you face when deploying a VPN is determining which device will serve as the termination point of the secured tunnel. You have several options, but often the decision rests on where in the network infrastructure you want to position the tunnel endpoint. The features the VPN device provides may be a factor in the decision.

Such factors include deciding which devices have sufficient processing power to maintain wire speed, even with heavy traffic and complex encryption. Another concern is whether network address translation (NAT) is present, as this can impose problems for tunnel-mode encryption.

VPN Deployment Models

A hardware VPN uses a dedicated device to perform VPN functions ...

Get Network Security, Firewalls, and VPNs, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.