Cybersecurity

Configuring VPN Access in a Back to Back ISA Server Environment

VPNs have been a topic of growing interest for the last couple years. However, since the tragic events in New York City in September of 2001, the subject has become red-hot. Why? Business and network managers now have a greater awareness that the weakest link in any design, whether it be a network or a business, is too high a level of centralization. Distributed systems are highly fault tolerant and difficult to bring down, while centralized systems can be brought to their knees with a single blow.

Configuring ISA Server For Inbound VPN Calls

You've implemented a ISA/VPN Server to allow secure remote connections to your internal network. While you might have configured your VPN Server in a secure manner, what about your VPN clients? In this article I'll talk about important issues regarding VPN client configuration and how it impacts network security.

Scroll to Top