VPN Best Practices

VPN is quite self-explanatory as it relates to the security appliance deployment in Chapter 11, “Deploying VPNs.” You could address a few minor points to increase your security posture.

Clients that come in as VPN connections should be a great concern for you as an administrator. These clients have generally been in many insecure environments that attract viruses, worms, Trojans, adware, and spyware. An average PC, connected to a large Internet service provider (ISP) without a firewall or host intrusion prevention, will likely be infected in less then 30 minutes.

Here's a list of environments where malicious code is easily picked up, many times without any indication to the user:

  • Home PC with the kids downloading games

  • Home ...

Get Securing Your Business with Cisco ASA and PIX Firewalls now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.