Q

A short enterprise VPN deployment guide

When deploying a VPN in your enterprise, first check out this guide for some basic best practices, including how to define authentication requirements for the VPN and create a written user access policy.

Our company is doing research on implementing a VPN so employees can work remotely. Does the initial implementation

tend to be expensive, and what are some implementation pitfalls that we ought to avoid?

Fortunately, a VPN deployment is usually inexpensive. In fact, if you don't expect more than a few dozen VPN users, you probably already have the technology you need built into your firewall. Consult the manufacturer's documentation for details. If, however, you expect a high load of VPN activity, you'll probably want to purchase a dedicated VPN appliance that uses hardware encryption technology for efficient processing.

When I think about past VPN deployments, these are the two requirements that come to mind to ensure a successful implementation:

  • Define your authentication requirements for the VPN up front. What type of authentication will you require? The username and password setup is easy and familiar to users, but may not be enough to provide the desired level of network security. Many organizations choose to use an additional technology, such as keyfob authenticators, to increase the degree of trust in VPN user identities.
  • Create a written user access policy. What services will VPN users be able to access? Will they be granted the same access to resources as users physically located in the office, or will their access be curtailed in some way? Sit down and document these policies before deploying your VPN or you'll be sure to have problems down the road.

A little planning goes a long way toward a successful VPN deployment. Clear up the policy issues from the beginning and you'll have an easier time rolling your VPN into production.

More on this topic

 

This was first published in June 2009

Dig deeper on SSL and TLS VPN Security

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close