Virtual Private Network (VPN) Security Policy

Chapter 9, “IPsec Virtual Private Networks (VPN),” covers VPNs in more detail; however, because this chapter covers security policies, the growth of VPNs in use today demands inclusion of a sample policy for VPNs here. This policy is prefaced by a brief definition of what a VPN is, but you should refer to Chapter 9 for the full scope of this technology.

VPNs are becoming popular and have matured considerably in the last several years. Many companies use them as a means of securely connecting small remote offices or users of every description. The connections can be made secure through the use of IPsec (IP Security) and L2TP (Layer 2 Tunneling Protocol) and with the increasing prevalence of high-speed ...

Get Network Security First-Step, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.