Solved

How to Secure WAN for a unicast application?

Posted on 2009-06-29
1
216 Views
Last Modified: 2012-05-07
We need to collect data from multiple locations and direct the data to a central location.  We have a client server application. The client application runs on the central location where the server application runs on each location.  The client application sends out request (as UDP) to the server application for data.  The server will reply with data (as UDP) again.

Now the question is how am I secure or what is the best way to secure such an application on internet  where  each of the location is on DSL.

0
Comment
Question by:xewoox
1 Comment
 
LVL 51

Accepted Solution

by:
Netman66 earned 500 total points
ID: 24884202
I assume the sites are connected via a VPN tunnel?  They should be.

If this is the case, your tunnel is encrypted and secure.

If you want unicast traffic, it should be send using TCP rather than UDP.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Scenerio: You have a server running Server 2003 and have applied a retail pack of Terminal Server Licenses.  You want to change servers or your server has crashed and you need to reapply the Terminal Server Licenses. When you enter the 16-digit lic…
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now