HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > How to insert VPNs in existing security architectures?
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|How to insert VPNs in existing security architectures?  
> Access to the content HTML Beginning of the presentation  
> Description Typical architectures and examples of extranet VPNs, with a distinction between VPNs for partners and for employees. What are the integration problems into the existing security infrastructure? How should this insertion be performed?  
> Context & Dates Talk made during an @jour seminar, Le VPN Extranet, organised by Internet Professionnel and 01 Réseaux, on 29 September 1999.
 
> Author Hervé Schauer (Herve.Schauer@hsc.fr) 
> Type 20 slides [ French - HTML ]  
> Abstract &
Table of content
Flyleaf

Agenda
Hervé Schauer Consultants
Hervé Schauer Consultants (2)
Types de VPN chiffrés

Extranet pour partenaires
Exemples
Caractéristiques
Architecture
Architectures types
Architecture d'ENX
Point d'accès d'ANX
Intégration

Extranet pour salariés
Exemples
Caractéristiques
Architecture
Intégration

Gestion des VPN
Recommandations
Conclusion
Ressources  

> Related documents
themeVPN (Virtual Private Networks)
[Tool]  SSToPer tool [A Linux implementation for SSTP client - English]
[Presentation]  Tunnels detection at network border [2 June 2006 - French]
[Article]  Détection de tunnels aux limites du périmètre [2 June 2006 - French]
[Presentation]  SSL VPN connection multiplexing techniques [7 April 2005 - English]
[Presentation]  SSLtunnel for Windows [22 September 2004 - French]
[Presentation]  SSLTunnel : VPN for roadwarriors [4 February 2004 - French]
[Tool]  SSLTunnel tool [PPP VPN on SSL - English]
[Presentation]  IP VPN with IPsec tunnels [12 September 2001 - French]
[Presentation]  Protocols for tunneling and network security [29 September 1999 - French]
[Presentation]  Encrypted tunnels with Linux [18 June 1999 - French]
themeSecurity Architectures
[Article]  Évolution des attaques de type Cross Site Request Forgery [1 June 2007 - French]
[Presentation]  Tunnels detection at network border [2 June 2006 - French]
[Article]  Détection de tunnels aux limites du périmètre [2 June 2006 - French]
[Presentation]  How to make one's Internet security [5 January 2002 - French]
[Presentation]  Security architecture for connecting to the Internet [18 December 2001 - French]
[Article]  How to set up security systems? [29 March 2001 - French]
[Article]  TAFIM - Technical Architecture Framework for Information Management [May 1997 - French]
[Article]  How to build a secure Internet access architecture? [October 1995 - French]
> Copyright © 1999, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 22 April 2002 at 15:33:59 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants