Security Basics mailing list archives

Re: Learning WAN technologies


From: Jerome Walter <walter () nexantis net>
Date: Tue, 14 Sep 2004 14:48:36 +0900

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Bryce Embry wrote:

| Howdy,
|
| I've recently become responsible for an enterprise that includes
| multiple buildings in different parts of a county.  I am comfortable
| with LAN technologies and how the Internet works, but don't know much
| about private networks once the LAN has left the building.
|
| Can you recommend good resources for learning the options I have for
| configuring a wide-area network to connect these multiple buildings?
| Right now I don't know enough to be able to intelligently sort through
| the various ideas floated by vendors and colleagues.
|
| I'd love any white papers, book recommendations, mailing lists,
| journals, websites, etc.

Start by a google search on the papers you find about VPN (Virtual
Private Networks), as it seems what you are looking for.

If you are not comfortable with this technology, it is a mean to connect
several private networks linked through the internet in a secure wide
private network.

O'Reilly books are usually good in most matters, but you will serely
find a lot of useful and free information that please your tastes with
the numerous windows and unix aimed documentations and howtos.

I hope you will come soon to discuss your discovering and problems about
this setup ;)


Best Regards,


Jerome Walter
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (MingW32)

iD8DBQFBRoY0+i7U/c9vdcYRAlVcAJoC/8ADfuiC5MRGI3weMjIzB0XjewCfZlqb
gYK34m8tg9I1lVuhoQrwbT0=
=I+xf
-----END PGP SIGNATURE-----

---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: