Roadmap to deploying your VPNs

Roadmap to deploying your VPNs

Because Secure Computing products provide network security, we recommend that, as the network administrator, you carefully oversee the installation and configuration of the Soft-PK client(s). Setting up VPN connections using Soft-PK and Sidewinder involves performing procedures on each remote system running Soft-PK AND on your Sidewinder.

If done properly, administrators can do most of the VPN configuration for both Soft-PK and Sidewinder, with little required of the end users. For example, you can set up the digital certificates and create a security profile that you include with Soft-PK’s installation files. Users then simply need to install Soft-PK and import a few files.

TIP: A separate Soft-PKUser’s Guide is NOT provided for end users of Soft-PK. As an administrator, you should use the worksheet provided on the SafeNet/Soft-PK CD-ROM (in MS Word format) as the basis for providing the remote Soft-PK users with the appropriate installation and setup instructions. This way, Soft-PK users are required to follow only the instructions that have been customized for your firewall configuration. (Refer to Chapter 5, "Deploying Soft-PK to Your End Users" for details about the worksheet.)

Figure 1-2 provides a graphical overview of the Soft-PK and Sidewinder VPN deployment process. Each of the tasks depicted in Figure 1-2 are also reflected in the checklist starting on page 1-7.

Getting Started

1-5

 

 

Page 15
Image 15
Secure Computing SafeNet, Sidewinder Version 5.1.0.02, Soft-PK Version 5.1.3 Build 4 manual Roadmap to deploying your VPNs