IPSec Vs. SSL VPN: Transition Criteria and Methodology
This white paper explains how to assess one's VPN needs, identify the limitations and optimal uses of IPSec, understand the benefits of an SSL VPN, consider key remote access configuration variables and examine the particular use cases in which one might keep IPSec. People will also discover how to evaluate SSL VPN solutions and what crucial features and benefits they will need to compare. They will also review alternative deployment scenarios and learn best practices on how to implement a staged VPN replacement, including the best-practice transition methodology and the impact upon administrators and end-users. Finally, they will receive first-hand insights from a real-world replacement.