Tunneling and Client/Server Remote Access

  • Please answer the following questions. 
  • Define tunneling in the VPN environment and explain the difference between voluntary and compulsory tunnels.
  • How does the VPN technology provides security to a corporate network? You may also choose to compare two or more VPN technologies.
  • Consider the VPN technologies studied in this session, including IPSec in the Tunnel mode, L2TP over IPsec, PPTP and SSL/TLS VPN. Which one would you choose for your company? Can you discuss its advantages and its weakness or drawbacks? Do you know some products that are based on that technology?
  • Discuss the specific techniques for securing the remote client and the remote access server and the common concerns of each.

Leave a Reply

Your email address will not be published. Required fields are marked *