Chapter 5. Planning for an SSL VPN
SSL VPN certainly offers exciting potential but this does not mean that it is a perfect technology or that it is suitable for addressing every remote-access need. In this chapter, we will examine scenarios that are appropriate candidates for an SSL VPN deployment, and cases where IPSec or some other alternative technology might be better suited. We will also cover some important things to look for when selecting an SSL VPN product, and some guidelines for performing the actual preparation for SSL VPN implementation.
Determining Business Requirements
Technology is a tool that can be used to help people achieve business goals; as such, specific technology selections should always be based on business requirements and not vice versa. It is critical to define what objectives an organization wishes to address and based on such requirements, select an appropriate technical tool. The case of SSL VPNs is no exception to this rule.
Remote Access Paradigms
Remote Access...