·
Firewall-based VPNs make use of firewall’s security mechanisms and
restrict access to the internal network. They perform address translation;
satisfy strong authentication requirements; real-time alarms and extensive
logging.
·
Hardware-based VPNs provide the highest network throughput of all
VPN systems. As
there is no
operating system or other applications there is no processor overhead. Most hardware-based
VPN systems are encrypting routers. Hardware-based products generally tunnel
all traffic regardless of protocol. Best hardware VPN packages offer software-only
clients for remote installation and include access control features managed by
firewalls or other perimeter security devices.
·
Standalone VPN application packages offer the most
flexibility in how network traffic is
managed.
Software-based products allow traffic to be tunneled based on address or
protocol.
Ideal in situations where both endpoints of the VPN are not controlled by the
same organisation
e.g. client support, business partners.
