This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Failure

VPN Policy

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

VPN Policy

An organization needs to come up with better policies for the VPN. In this case, there are several things that an organization considers before coming up with the policy. The first thing is what will be contained in the policy. The organization needs to determine the key facts that will be included in the policy, which will help come up with a successful VPN policy. The VPN policy will state who in the company will use the VPN and the purpose of using it. To come up with the best VPN policy, it is best to consider some of the topics (Fu, 2001, January). The key issues include:

The kind of VPN to be used

In this case, the remote user will have the opportunity of connecting a site to site VPN using two different sites. For instance, employees that are using their laptops and VPN software will not have much control over the system. A company whose computers are connected to the VPN are guaranteed of better security control, unlike the users who are connected through their devices.

Don't use plagiarised sources.Get your custom essay just from $11/page

Does the organization require a split tunnel?

In this case, the users can access BOTH, the secured VPN, and the unsecured network in the fact that the VPN is connected. It is very harmful and dangerous to the organization. The organization, in this case, needs to consider the best way of splitting the tunnel (Yang, Liu & Krems, 2009).

Will the users use the VPN concentrator?

It is another thing that should be added when coming up with the policy. In this case, it is essential to use the VPN hardware on the device when every side of the VPN tunnel, which is not applicable for roaming laptop users. In this case, it is best to use separate tools when connecting the VPN.

References

Fu, Z., Wu, S. F., Huang, H., Loh, K., Gong, F., Baldine, I., & Xu, C. (2001, January). IPSec/VPN security policy: Correctness, conflict detection, and resolution. In International Workshop on Policies for Distributed Systems and Networks (pp. 39-56). Springer, Berlin, Heidelberg.

Yang, A., Liu, Y., & Krems, S. (2009). U.S. Patent Application No. 11/731,091.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask