Security Basics mailing list archives

Re: Learning WAN technologies


From: Benoit Lefebvre <blefebvre () acces com>
Date: Mon, 13 Sep 2004 14:11:20 -0400

Like we do here, you can get Sonicwall firewalls

And link them with VPN (Virtual private network)

It's really easy to setup/use and it's transparent for the users.

--Benoit Lefebvre

Bryce Embry wrote:

Howdy,

I've recently become responsible for an enterprise that includes multiple buildings in different parts of a county. I am comfortable with LAN technologies and how the Internet works, but don't know much about private networks once the LAN has left the building.

Can you recommend good resources for learning the options I have for configuring a wide-area network to connect these multiple buildings? Right now I don't know enough to be able to intelligently sort through the various ideas floated by vendors and colleagues.

I'd love any white papers, book recommendations, mailing lists, journals, websites, etc.

Thanks,

Bryce


--------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------




---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: