In order to use Intel Packet Protect successfully, you must develop a deployment model that fulfills your security needs on your network. There are several stages to consider in developing your deployment model.
Review your network architecture and corporate security guidelines.
Assign security behavior roles to systems that you want to use Intel Packet Protect.
This discussion represents only an overview of some of the issues to be considered when deploying Intel Packet Protect in your enterprise. For more detailed information about deployment models, please refer to "Scalable Deployment of IPSec in Corporate Intranets" white paper from the Intel Architecture Labs Internet Building Blocks Initiative. This white paper can be found at:
ftp://download.intel.com/ial/home/ibbi/ipsec_122.pdf
Copyright © 2000, Intel Corporation. All rights reserved.
Intel Corporation assumes no responsibility for errors or omissions in this document. Nor does Intel make any commitment to update the information contained herein.
* Other product and corporate names may be trademarks of other companies and are used only for explanation and to the owners' benefit, without intent to infringe.