Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

What is the difference between local VPN solution and Check point or any other solution.

Posted on 2007-11-16
6
Medium Priority
?
183 Views
Last Modified: 2010-04-21
Hi,

I am looking for a VPN solution.In the internet i see amny ways in which one way is the local configuaration at the local machine like this.
http://www.windowsecurity.com/articles/Configure-VPN-Connection-Windows-XP.html

What is the difference between this and the check point or any other solutions...

Regards
Sharath
0
Comment
Question by:bsharath
  • 3
  • 2
6 Comments
 
LVL 6

Accepted Solution

by:
Nathan P earned 1000 total points
ID: 20298781
Biggest difference is that if you rely on your Windows Server to configure a VPN, and that Windows Server crashes, your VPN access is gone.

For example, this is important if you have ILO or Remote Power access to the system, you could still VPN with a Checkpoint/Snapgear/Cisco firewall with VPN, and then trigger a restart.

The other difference, is that mostly, third party VPN solutions have a different access list and does not rely on Active Directory.   Handy if you want to give VPN access to people who you DONT want to give a Active Directory Listing.  
0
 
LVL 78

Expert Comment

by:Rob Williams
ID: 20298891
A few other reasons to use a hardware VPN device:
-Windows VPN is not quite as secure as it generally uses the PPTP protocol and hardware VPN solutions use IPSec.
-Using a VPN router give you a dedicated device for encryption and decryption which will give you slightly better performance
-A hardware device is a perimeter solution, stopping attackers before they get to the server
0
 
LVL 11

Author Comment

by:bsharath
ID: 20307476
For an external VPN solution.Should we have a server and have any VPN server software installed?
From where we give access or create users?
For a client to connect to the remote Domain what are all required to be given to the client.
Like username,Password,Software.... what all other than these.
0
Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

 
LVL 78

Assisted Solution

by:Rob Williams
Rob Williams earned 1000 total points
ID: 20307640
>>"Should we have a server and have any VPN server software installed?"
If you are adding hardware you are far better to buy a VPN router. The router will be more secure, have better performance, and easier to configure.

A VPN router will also have it's own VPN client.
Access is granted by the router, but most can also be set up to use a Windows RADIUS server to use Windows Active Directory accounts for access permissions if you like.

For the client to connect they need the appropriate VPN client to suit your VPN solution, and usually a password. The client would be installed by you or provide in a prebuilt installation package. Some also require a user name and some have the user name  built into the deployment package.
0
 
LVL 11

Author Closing Comment

by:bsharath
ID: 31409563
Thanks a lot...
0
 
LVL 78

Expert Comment

by:Rob Williams
ID: 20311532
Thanks bsharath.
Cheers !
--Rob
0

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Make the most of your online learning experience.
LinkedIn blogging is great for networking, building up an audience, and expanding your influence as well. However, if you want to achieve these results, you need to work really hard to make your post worth liking and sharing. Here are 4 tips that ca…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

578 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question