All scenarios presented in this document have been tested using a mix of Red Hat Linux Fedora Core 2, Microsoft Windows 2000 Professional and Microsoft Windows XP Professional. However, this document comes with no support and no guarantees.
This document supposes that the reader knows the fundamental basics of the Linux and Microsoft operating systems, basic VPN technology and IP routing. The document will not explain how to build firewall rule bases, it will not explain (the used) technologies like "IP", "VPN", "firewalls", "SSL", "PKI", "certificates", "IPSEC" etc.
Download the paper in PDF format here.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.