Well, based on a number of emails I have received, some people were quite surprised to learn in my first blog post that poorly designed and configured IPsec VPNs are vulnerable not only to the NSA and ...
Previous articles (Part one, Part two) in this series on implementing VPN gateways using Cisco routers discussed the IPsec protocol and basic IPsec VPN connection models. Now we'll learn how to ...
Companies and municipalities alike have a keen interest in extending the reach of their pre-existing wired networks at the lowest possible cost. One attractive solution is wireless mesh communications ...
In my last blog post, I recommended a number of ways to avoid the first five of my top ten reasons why IPsec VPNs fail. As promised, in this blog post, I’ll finish this particular topic by explaining ...