VPNs are available both commercially and as open source. Research the VPN solution of two IT solutions vendors. Be prepared to discuss both types.

  • Discuss which solution you would recommend for a small business, and why.
  • Explain each of the following VPN implementations: DMZ-based, bypass deployment, and internally connected deployment.
  • Explain the architecture that you consider to be the preferred technique for a VPN, and why.
  • Discuss what you consider to be the most important feature of your VPN.

    Leave a Reply

    Your email address will not be published. Required fields are marked *