ZyXEL Communications NWD-170N Bedienungsanleitung Seite 2

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 8
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 1
VPN
Early Virtual Private Network technology allowed remote computers to log into
company networks with sufficient security to stop eavesdroppers from reading the
communications. Branch offices and mobile users rely on VPNs, linking client
hardware or software back to company routers with VPN connections.
As with all security products, VPN continues to evolve. Now VPN uses stronger
encryption to stay ahead of the hackers. The newest versions of VPN software in
routers allows clients to connect to the company VPN using their browser's security,
like connecting to online banking sites. This means no more specialized hardware or
software on the remote end is needed to link securely back to the company. Less
hassle, more flexibility, and even more security for your connection.
Those companies following the "if it an't broke" cliche will find this document quite
useful when the network does break, as the cliche promises it eventually will. In your
panic, I hope you find and upgrade the right network component quickly.
Those companies following the "Stitch in time" cliche will find this document a wonder-
ful roadmap as you constantly improve and upgrade your network. Of course, your life
will lack the heart pounding excitement people get when their networks break, because
you are upgrading the weak links on a regular basis. You'll have to get your aerobic
exercise the old fashioned way, but your smooth running network will leave you plenty of
leisure time.
Don't try and redo your entire network all at once. First, your boss won't give you the
budget, but second and more importantly, you only want to change one thing at a time
on your network. Change something, monitor the network and make sure it returns to
normal, then change something else.
5 Upgrades Your Network Needs
Internet
Telecommuter
VPN VPN
Server
Pick the philosophy used in your company:
If it ain't broke, don't fix it.
A stitch in time saves nine.
UTM Routers
Unified Threat Management, the modern way to protect your network, uses multiple
technologies to defend your company. As hackers get more organized and more criminal,
your defense must get more organized.
You can configure some or all of the following protection modules: Anti-Virus to stop
viruses at the entrance to your network and reduce the load on individual PC virus
software. Anti-Spam to reduce the load on individual mailbox spam filters. Intrusion
Detection and Prevention (IDP) to stop hackers from reaching PCs with operating system
security holes. Web content filtering to stop users from wasting time at work, and possibly
involving the company in illegal actions due to pornography and online gambling activities.
A firewall is no longer enough. Think of UTM as a firewall with extra fortifications, such as
barbed wire and cauldrons of boiling oil used to repel invaders. Hackers aren't nice to you,
and you shouldn't be nice to them.
Perimeter
Protection
1
2
UTM
Secure Corporate Network
Seitenansicht 1
1 2 3 4 5 6 7 8

Kommentare zu diesen Handbüchern

Keine Kommentare