- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - Linux
- >
- Virtual Private Networks
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-07-2008 10:33 PM
тАО05-07-2008 10:33 PM
Virtual Private Networks
Please suggest some software that has the ability to share over two standard protocol units. We require some easiest way to protect our companyтАЩs data. We need security at times of incidents like rootkit attacks and zero-day vulnerabilities.
Any help in this regard would be highly appreciated.
Thanks,
J.Kissko
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-08-2008 02:02 AM
тАО05-08-2008 02:02 AM
Re: Virtual Private Networks
Cisco has some fairly good hardware and software for setting up VPN.
Basically, it provides network access. How much you determine with security policy.
I've been working with a system that requires a USB token to get into the VPN and there have been no security breaches. I work at a company that is a fairly high profile target for this.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-08-2008 02:05 AM
тАО05-08-2008 02:05 AM
Re: Virtual Private Networks
The question is somewhat incorrect however. A VPN is not a direct solution to a rootkit, or a zero-day vulnerability. I'm an unsure what you mean by "two standard protocol units".
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-12-2008 10:42 PM
тАО05-12-2008 10:42 PM
Re: Virtual Private Networks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-15-2008 09:47 PM
тАО05-15-2008 09:47 PM
Re: Virtual Private Networks
If you need to secure your clients you could always use bit locker if you run Windows Vista, combined with a server/domain-isolation with a NAP-solution you could ensure that only approved clients can connect to your servers. Protection against viruses and malware could be provided by any 3rd-party product or Windows Defender / Forefront client security.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-20-2008 03:25 AM
тАО05-20-2008 03:25 AM
Re: Virtual Private Networks
If you've got a "good" external firewall, then you should be able to setup PPTP or L2TP VPN tunnels directly to that from the clients. Some firewalls even come with their own software clients that you install on the client PC. Otherwise most OS's will allow you to create VPN's natively.
Will these protect from rootkits and 0-day vulnerabilities? Not really. However, you can back them up with a solid set of security practices, covering things from smallest surface area, least privileges, port and packet filtering to anti-virus and sign agreements / acceptable use documents.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-23-2008 02:40 AM
тАО05-23-2008 02:40 AM
Re: Virtual Private Networks
1. Each user has a key/tag, this provides authentication.
2. They will have some kind of VPN software to connect to the concentrator.
3. And the VPN concentrator confirms the authentication and act's as the gateway for your VPN connection once authenticated.
"
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-28-2008 02:46 AM
тАО05-28-2008 02:46 AM
Re: Virtual Private Networks
Anybody out there who has hands -on experience with MokaFive?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-03-2008 03:57 AM
тАО06-03-2008 03:57 AM
Re: Virtual Private Networks
Try the tools, technology and services provided by "Mokafive". Check out:
http://www.mokafive.com/
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-06-2008 02:19 AM
тАО06-06-2008 02:19 AM