An Introduction to Virtual Private Networks – Part 6

0
33
views

Introduction

Our last blog post of the series focused upon the issues faced by the deployment of a Virtual Private Network (VPN) from the standpoint of your employees and IT staff.

In this blog post we focus upon the technological impacts of it.

The Impacts to the Firewall

There are three types of processing which can be utilized, in a Virtual Private Network system, and they are as follows:

1. Symmetric Multiprocessing, or SMP: this is when a web server relies upon a single multiprocessor as well as a single memory capability in order to accomplish the workload which has been assigned to them, but the scalability of the SMP is a very serious limitation.

2. Massively Parallel Processing, or MPP: this is when the role of the logic chip has its very own processor as well as its own memory subsystem to process information and data.

These are all threaded to the nodes and it collects the results on the other end.

As one can tell these types of processors are very expensive, but also offer limited scalability to the Virtual Private Network system;

3. PC Clustering: in a Virtual Private Network system, this type of approach bridges the first two processing techniques as described up above.

This type of system can contain unlimited sub processors, all connected via a fiber link, or what is known as an optical network.

With this type of system, each SMP runs its own version of the operating system, and can provide strong backup features.

However, the biggest drawback is that this type of system is quite costly.

Impacts to The Application Server

These kinds of servers store, manage, operate, and control the specialized software components which are relevant and very important to your place of business or organization.

In this regard, you may also want to consider implementing a trusted host.

This simply makes use of Access Control Lists (or ACL’s) in an effort to thwart hacking attempts at running or installing various application and software programs – provided that they do not have the authority to be installed onto the application server.

It is also important to remember not to place too much work on the type or kind of application server.

This could place a great strain on the Virtual Private Network system, by adversely impacting the inflow of data packets.

Impacts to The Database Server

It is the database that stores your purchasing data, the customer data as well as all of the other data warehousing techniques that you use to analyze the relevant information about your competitors.

When the Virtual Private Network is installed at your place of business or organization, it is absolutely imperative to make sure that all company information and data is encrypted across all levels.

This includes the Field Level, the Row Level, the Table Level, as well as the entire database level.

Conclusions

This wraps up our series on Virtual Private Networks.

On another note we have a different blog post series that examines a specialized kind of Phishing, known as “Spear Phishing”.


Facebook Comments

LEAVE A REPLY

Please enter your comment!
Please enter your name here