Modern networks allow communication of remote or mobile devices to enterprise resources to improve productivity. One of the challenges of using this approach is to ensure that you provide a secure connection from the external location to the internal network. Two techniques that allow you to achieve this are tunneling and encryption over the public Internet. Details about VPNs and VPN concentrators have been covered in Chapters 16 and 21.
Some of the protocols used to set up tunneling and encryption are:
A . . .
The content below this message is for members only.