Does anybody know of a document that is available that lists all of the security concerns (viruses, hacking, etc.) when allowing VPN tunnels into and out of a network (for both LAN-to-LAN and client to LAN?) It does not have to be a Cisco document, but just something that could be used as a reference. We are trying to justify our strict requirements for setting up a VPN to our network. Thanks.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...