A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is
This paper presents a layered VPN planning framework for organizations based on actual implementation experience. Specifically, we describe security issues corresponding to five distinct layers of analysis: (1) VPN technology; (2) Firewalls; (3) Legacy Networks; (4) Survivability; and (5) Legacy Applications. There is a broad spectrum of VPN options available with each having its own strengths, weaknesses, and vulnerabilities. It is anticipated that no single VPN solution will supplant othersdoi:10.1109/lcn.2000.891033 dblp:conf/lcn/PattonSDY00 fatcat:hrf2vwn2fvbordh66zv36mp3kq