
Designing Access Controls
Make Decisions about Remote Access (VPN)
When factoring in only administrative workload and IT budget, the PCU network administrators have selected the options shown in Table
Table
Budget
Factor | VPN Protocol | Authentication | Encryption | Client | Gateway |
|
| Method |
|
|
|
|
|
|
|
|
|
Administrative | IPsec with IKE | Preshared key | Any | ProCurve VPN | Secure Router |
workload and IT |
|
|
| Client | 7000dl |
budget |
|
|
|
|
|
|
|
|
|
|
|
Endpoint Capabilities and Administrative Control over Endpoints
You might have little control over the equipment with which remote users access your network. After all, a primary goal of a VPN is to grant users access from wherever they are. Fortunately, there are many options for VPN clients for most laptops and workstations. A few VPN clients have even been devel- oped for smartphones such as Blackberries; however, granting these devices remote access will probably be more complicated no matter which options you choose for the VPN.
Table