The choice between SAM and NC will vary based on what you're trying to accomplish, and how much administration you're willing to deal with. If your users need access to only a handful of resources on the network, and you can get away with using SAM, then that is your best bet. Just define what resources they have access to, and you're done. The only downsides are having to deal with managing the resources you're allowing via SAM, and the firewall policy you'll have in place. If you need to provide the remote users with "look and feel" of being on the network: log-in scripts for drive mapping, etc, then you're probably better off with Network Connect. It allows you to define a much broader access, and then control everything via the firewall policy. The downsides can depend on how you feel about split tunneling. By not allowing it, you will either have to deny users access to the internet, their resources.. etc, or be willing to absorb this traffic and allow it to traverse your network to get to the internet. If you plan on enabling GINA, then you have to take into account remote users who may be using their own workstations (they tend dislike GINA being loaded on their machines.) If you don't user GINA, you may still invoke their login scripts. The only drawback is that depending upon when their credentials expire, unless you are also using AD to authenticate them across the SSL, they will not be prompted to change them. I can go on, but I think those are the key points to consider when making a decision. Hopefully this helps. Regards,
... View more