IMO the best place to start is to require some sort of secure remote
access mechanism.

Most SSL VPN offerings support 2 factor, for example, and the
traditional fat IPsec VPN client a sort of 2 factor authentication
stemming from the way fat IPsec clients work.

The way IPsec VPN clients does 2 factor:
part 1) A IKE phase 1 pre-shared key that the fat client MUST provide
before getting to phase 2. Some people use X.509 certificates for the
phase 1.
part 2) username & PW authentication via XAUTH

Richard Stovall wrote:
> 1) minimal cost (naturally)
> 2) minimal installation footprint
> 3) flexibility (different rules depending on where the user is
> physically located)
> 4) ease of management
> 5) upgrade-ready (to future AD versions, etc.)
> 
> All thoughts and experiences are welcome.

-- 

Phil Brutsche
p...@optimumdata.com

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to