
Designing Access Controls
Make Decisions about Remote Access (VPN)
Table
Factor | VPN Protocol | Authentication | Encryption | Client | Gateway |
|
| Method |
|
|
|
|
|
|
|
|
|
Existing network | IPsec with IKE | Digital certificates | Any | ProCurve VPN | Secure Router |
infrastructure |
|
|
| Client | 7203dl |
|
|
|
|
|
|
Bringing All Factors Together
Having considered the factors above, you can select options for your VPN. You can use Table
Sometimes, you may decide that two options meet your requirements for that factor. You might enter your preferred option and see whether it works when you consider other factors. On the other hand, you might enter both options and count each one once. Either way, in the end, you will choose the option that works best when all factors are taken into account.
You can also enter values in the “Weight” column to weight certain factors more heavily; a higher value prioritizes the corresponding factor. For example, if your greatest concerns are security and your existing network infrastruc- ture, you could assign these factors a weight of 3. When you total the access control methods, count the method twice if the weight is 2, three times if the weight is 3, and so forth.
You might also want to total columns in the order that a particular option is important to you. For example, if you know that you want to use a particular gateway, you should choose that gateway first and then eliminate options that are not supported by that gateway.