[Agenda] [Examples] [Network Partitioning] [Concepts] [Policy] [Process] [Organization] [HW-SW] [Cases studies] [Conclusion] [Resources]
[first slide] When should Network Partitioning be used? (1/2) [previous slide] [next slide]

* Unclear or unmanageable or porous network perimeter
o Intranet over a WAN using VPN
o VPNs with mobile users
   - what security should be on a mobile PC directly connected to the Internet and within the private network throught a VPN?
o VPNs with branches over the Internet
o Modem banks and remote access users
o Extranets
o E-Commerce platforms that integrate core business to the Internet
   - like layered n-tier architectures
o B-to-B applications that interconnect core business to suppliers
o All need to communicate:
   - mobile users via VPN that updates E-Commerce platforms

HSC ® © Hervé Schauer Consultants December 1999 - 142, rue de Rivoli - F-75001 Paris - France
Phone: +33 141 409 700 - Fax: +33 141 409 709 - Email: <secretariat@hsc.fr>
- Page 20 -