Firewalls & VPNs

Last Updated on 21 Nov. 2012, Total: 29 Articles and Tutorials

  1. A firewall in an IT system

    The term “firewall” evokes the image of a solid wall in a building, which prevents a fire spreading from one part of the building to another. Sometimes it is understood as a “wall of fire” blocking the entrance... Read More

  2. Application Layer Filtering (ALF): What is it and How does it Fit into your Security Plan?

    ALF, not a nickname for Alfred but an acronym for Application Layer Filtering, is one of the hottest new buzzwords in a jargon-laden security subfield: firewall technology. Firewall vendors are rushing to implement ALF into their firewall products, and/or beefing up their ALF implementations to compete with those of other vendors. But exactly what is ALF and is it a... Read More

  3. Comparing Firewall Features

    In this article, we’ll take a look at some of the factors you should consider when buying a firewall, features available on some of the most popular offerings, and how to compare the real cost of each (hint: the initial purchase price is only a starting point)... Read More

  4. Comparing VPN Options

    Virtual private networking has become necessity for business users who need to remotely access their files. Of course, they could dial in directly to a remote access server, but that solution has a couple of significant drawbacks. The solution, of course, is a VPN connection. This article will discuss the different VPN options available... Read More

  5. Configure a VPN Connection Using Windows XP

    In this article we will learn how to configure a connection to a virtual private network (VPN) using Windows XP. This article will show you how to create a new VPN connection using Microsoft Windows XP. By creating an encryption tunnel through the Internet, data can be passed safely... Read More

  6. Configuring Gateway to Gateway L2TP/IPSec VPNs Part 1: Configuring the Infrastructure

    Configuring a gateway to gateway VPN is easy using ISA Server. The reason why it’s so easy is that the Local and Remote VPN Wizards make the setup a virtual no-brainer. Well, it’s a no-brainer when you’re configuring PPTP VPN gateways. But if you’re in the market for a high security L2TP/IPSec gateway to gateway VPN, you probably have either... Read More

  7. Configuring Gateway to Gateway L2TP/IPSec VPNs Part 2: Configuring the Infrastructure

    In part 1 of this series on how to configure an L2TP/IPSec gateway to gateway VPN solution, we examined how to configure the certificate infrastructure and assign machine certificates on the local network. This week, we’ll complete our gateway to gateway VPN configuration... Read More

  8. Configuring ISA Server For Inbound VPN Calls

    You've implemented a ISA/VPN Server to allow secure remote connections to your internal network. While you might have configured your VPN Server in a secure manner, what about your VPN clients? In this article I'll talk about important issues regarding VPN client configuration and how it impacts network security... Read More

  9. Configuring VPN Access in a Back to Back ISA Server Environment

    VPNs have been a topic of growing interest for the last couple years. However, since the tragic events in New York City in September of 2001, the subject has become red-hot. Why? Business and network managers now have a greater awareness that the weakest link in any design, whether it be a network or a business, is too high a... Read More

  10. Considering remote access for IT professionals

    Taking a look on some different types of remote access solutions that you can use for internal and external support... Read More