Security Solutions

3-49
Designing Access Controls
Make Decisions about Remote Access (VPN)
Table 3-32. Preliminary Decisions for VPN Options
Example
For example, Table 3-33 lists the choices that the PCU network administrators
have made, based on each factor. For them, security is the most important
factor. In the end, they select the IPsec with IKE and digital certificates for
authentication. They create a preferred security policy that calls for the
strongest encryption and hash algorithms. However, they will create another
policy that allows different algorithms to ensure that all endpoints can con-
nect. Finally, for the gateway, they purchase the IPsec VPN Module for their
ProCurve Secure Router 7203dl, and, for the client, they purchase an unlimited
user licence for the ProCurve VPN Client.
Factor Weight VPN Protocol Authentication
Method
Encryption Client Gateway
Security
User type and
sophistication
Administrative
workload and
IT budget
Endpoint and
administrative
control
Existing
network
infrastructure
To ta l