This chapter tackles assessment of services found running on network boundaries that provide secure remote access over IP. Increasingly, VPN services provide access for both home users and branch offices, using IPsec, proprietary Check Point FWZ, or Microsoft PPTP. These services are under threat primarily from offline preshared key-grinding and information-leak attack, which are described in the following sections.