O'Reilly logo

Configuring IPCop Firewalls by James Eaton-Lee, Barrie Dempster

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Virtual Private Networks

As discussed in earlier chapters, many of the technologies underpinning the way in which networking works were designed with considerations quite different to those facing IT professionals and computer users today. Among the most salient of these are concerns about security.

Remote access, another principal concern among IT Professionals, is the practice of allowing employees, contractors, clients, and suppliers to access resources and services over a Wide Area Network or the Internet. This practice, since it necessarily involves not only connecting a company's internal network to the Internet but also allowing traffic from the Internet to gain access to the internal network, brings with it inherent security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required