The VPN is only as safe as the machine where used. Before deploying a VPN, review the implementation best practices, listed as do’s and don’ts, in TABLE 12-1.
DO | DON’T | |
---|---|---|
Passwords | Do change the original password to a strong password you will remember. | Don’t write down your password unless it will be stored in a safe. |
Software | Do buy or upgrade antivirus detection software. Do ensure your virus definitions are set to update automatically. Do check frequently for updated OS patches and application patches. |
Don’t go without antivirus software. Don’t ignore OS and application updates/patches. Don’t use unsafe applications such as peer-to-peer file sharing tools or applications of unknown origin. |
Firewalls | Do enable built-in firewalls. Do use external standalone firewalls whenever possible. |
Don’t go without either a built-in or standalone firewall. |
Hardware | If connecting via a wireless interface, do disconnect or disable the wired network interface. If connecting via a wired interface, do disconnect the wireless. Do use the VPN for work purposes only. |
Don’t enable or connect more than one network interface while using a VPN-connected computer. Don’t allow people to use the computer who might do so unsafely. |
Services and protocols | Do disable any unneeded services or protocols. | Don’t run default services and protocols unless each is specifically needed. |
Additional steps you can use for the VPN server include:
18.188.151.107