Designing Access Controls

Make Decisions about Remote Access (VPN)

When factoring in only administrative workload and IT budget, the PCU network administrators have selected the options shown in Table 3-28.

Table 3-28. Selecting VPN Options Based on Administrative Workload and IT

Budget

Factor

VPN Protocol

Authentication

Encryption

Client

Gateway

 

 

Method

 

 

 

 

 

 

 

 

 

Administrative

IPsec with IKE

Preshared key

Any

ProCurve VPN

Secure Router

workload and IT

 

 

 

Client

7000dl

budget

 

 

 

 

 

 

 

 

 

 

 

Endpoint Capabilities and Administrative Control over Endpoints

You might have little control over the equipment with which remote users access your network. After all, a primary goal of a VPN is to grant users access from wherever they are. Fortunately, there are many options for VPN clients for most laptops and workstations. A few VPN clients have even been devel- oped for smartphones such as Blackberries; however, granting these devices remote access will probably be more complicated no matter which options you choose for the VPN.

Table 3-29 identifies native VPN support included on various OSs. It also lists some capabilities that a vendor client such as the ProCurve VPN Client can add.

3-45

Page 161
Image 161
HP Access Control Client Software manual Designing Access Controls