Solved

How to Secure WAN for a unicast application?

Posted on 2009-06-29
1
219 Views
Last Modified: 2012-05-07
We need to collect data from multiple locations and direct the data to a central location.  We have a client server application. The client application runs on the central location where the server application runs on each location.  The client application sends out request (as UDP) to the server application for data.  The server will reply with data (as UDP) again.

Now the question is how am I secure or what is the best way to secure such an application on internet  where  each of the location is on DSL.

0
Comment
Question by:xewoox
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 51

Accepted Solution

by:
Netman66 earned 500 total points
ID: 24884202
I assume the sites are connected via a VPN tunnel?  They should be.

If this is the case, your tunnel is encrypted and secure.

If you want unicast traffic, it should be send using TCP rather than UDP.
0

Featured Post

[Live Webinar] The Cloud Skills Gap

As Cloud technologies come of age, business leaders grapple with the impact it has on their team's skills and the gap associated with the use of a cloud platform.

Join experts from 451 Research and Concerto Cloud Services on July 27th where we will examine fact and fiction.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

So you have two Windows Servers and you have a directory/folder/files on one that you'd like to mirror to the other?  You don't really want to deal with DFS or a 3rd party solution like Doubletake. You can use Robocopy from the Windows Server 200…
Setting up a Microsoft WSUS update system is free relatively speaking if you have hard disk space and processor capacity.   However, WSUS can be a blessing and a curse. For example, there is nothing worse than approving updates and they just have…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question