Novell BorderManager 3.9 Virtual Private Network Deployment Frequently Asked Questions

Novell® BorderManager® 3.9 includes premier firewall and VPN technologies that safeguard your network and help you build a secure identity management solution. With the powerful directory-integrated features in Novell BorderManager, you can monitor users’ Internet activities and control their remote access to corporate resources.

This documentation provides answers to some of the common questions you might encounter while using the Novell BorderManager 3.9 Virtual Private Network (VPN) services.

This documentation includes the following sections:

Audience

This audience for this documentation are experienced network administrators. This document is also userful for end-users who have VPN client installed on their computers.

Feedback

We want to hear your comments and suggestions about this manual and the other documentation included with this product. Please use the User Comments feature at the bottom of each page of the online documentation, or go to Novell Feedback Web site and provide your comments.

Documentation Updates

For most recent version of the Virtual Private Network FAQ, visit the Novell Documentation Web site.

Additional Documentation

It is recommended that you read this document as a supplement to the following other related documentation of Novell BorderManager 3.9:

Documentation Conventions

In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path.

A trademark symbol (®, ™, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party trademark.

When a single pathname can be written with a backslash for some platforms or a forward slash for other platforms, the pathname is presented with a backslash. Users of platforms that require a forward slash, such as Linux* or UNIX*, should use forward slashes as required by your software.