1.4 Various topology scenarios
Many of these VPN technologies can be affected by the layout and
needed resources of the users. Some technologies don’t handle roaming users
as well as others. Some have trouble with NAT (Network Address Translation),
still others run into problems with old routers or restrictive firewalls not even
supporting their protocols and refusing to route them correctly.
There are many ways one could adjust the VPN topologies listed in this
document, however a few will be listed to give some clarification of the
challenges.
Including a more robust “security in depth” approach in sufficient detail,
such as backup technologies, IDS (Intrusion Detection Systems) and monitoring
technologies, is beyond the scope of this document.
Detailing the various strengths and weaknesses of each topology is also
beyond the current scope of this document, however some more immediately
obvious points will be noted for each.
Topology 1
VPN Server (and/or client) directly connected to the Internet and internal
0
Do'stlaringiz bilan baham: |