O'Reilly logo

Network Security First-Step, Second Edition by Donald Stoddard, Thomas M. Thomas

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Virtual Private Network (VPN) Security Policy

Chapter 9, “IPsec Virtual Private Networks (VPN),” covers VPNs in more detail; however, because this chapter covers security policies, the growth of VPNs in use today demands inclusion of a sample policy for VPNs here. This policy is prefaced by a brief definition of what a VPN is, but you should refer to Chapter 9 for the full scope of this technology.

VPNs are becoming popular and have matured considerably in the last several years. Many companies use them as a means of securely connecting small remote offices or users of every description. The connections can be made secure through the use of IPsec (IP Security) and L2TP (Layer 2 Tunneling Protocol) and with the increasing prevalence of high-speed ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required