Roadmap to deploying your VPNs
Roadmap to deploying your VPNs
Because Secure Computing products provide network security, we recommend that, as the network administrator, you carefully oversee the installation and configuration of the
If done properly, administrators can do most of the VPN configuration for both
TIP: A separate
Figure 1-2 provides a graphical overview of the Soft-PK and Sidewinder VPN deployment process. Each of the tasks depicted in Figure 1-2 are also reflected in the checklist starting on page 1-7.
Getting Started | |
|
|