Talk:Virtual private network: Difference between revisions
imported>Howard C. Berkowitz (New page: {{subpages}} ==Textbooks and conflict of interest== I've written books in this area, but wanted to leave it to others to recommend appropriate references or further reading. '''''I''''' ha...) |
imported>Sandy Harris (→Query) |
||
Line 4: | Line 4: | ||
I did put in a public domain, very basic tutorial. [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 12:18, 14 July 2008 (CDT) | I did put in a public domain, very basic tutorial. [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 12:18, 14 July 2008 (CDT) | ||
==Query== | |||
The current initial definition reads: "A virtual private network (VPN) a set of sites, owned by customers, which are connected through some type of backbone." I think that is seriously misleading. Yes, there are quite a few VPNs to which that definition applies, but it does not seem general enough. | |||
I'd prefer something like "A VPN is a technology for connecting two or more trusted networks together using a third, untrusted, network in such a way that the combined network can be trusted." However, I thought I'd ask here before making major changes. |
Revision as of 07:45, 1 August 2008
Textbooks and conflict of interest
I've written books in this area, but wanted to leave it to others to recommend appropriate references or further reading. I happen to think they are informative on customer and provider VPN relationships :-). For the customer side, WAN Survival Guide (Wiley, 2001), and for the provider side, Building Service Provider Networks (Wiley, 2002).
I did put in a public domain, very basic tutorial. Howard C. Berkowitz 12:18, 14 July 2008 (CDT)
Query
The current initial definition reads: "A virtual private network (VPN) a set of sites, owned by customers, which are connected through some type of backbone." I think that is seriously misleading. Yes, there are quite a few VPNs to which that definition applies, but it does not seem general enough.
I'd prefer something like "A VPN is a technology for connecting two or more trusted networks together using a third, untrusted, network in such a way that the combined network can be trusted." However, I thought I'd ask here before making major changes.