Enabling Secure Virtual Private Networks

download Enabling Secure Virtual Private Networks

of 12

Transcript of Enabling Secure Virtual Private Networks

  • 8/8/2019 Enabling Secure Virtual Private Networks

    1/12

    Enabling Secure

    Virtual Private NetworksOver the Internet

  • 8/8/2019 Enabling Secure Virtual Private Networks

    2/12

    2

    E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t

    Contents

    Introduction 3

    The Promise of Internet-Based Networking 3

    sMigration of technologies onto a common infrastructure

    sCurrent and future applications migration

    The Importance of Internet Virtual Private Networking 4

    sTremendous cost savings

    sOutsourcing of equipment and management

    s Integration of applications onto acommon platform and infrastructure

    sVPNs an excellent WAN solution today

    Security over the Internet 5

    sStrong security with Intel Express Routers

    Internet VPNs with Intel Express Routers 6

    sSetting up links to ISPs

    sEasy transmission via any ISP

    sTunneling LAN protocols and filtering

    Alternative Solutions 7

    sRouter vendors

    sApplication software developers and operating systems

    sFirewall or dedicated devices

    The Future of VPNs 9

    sQuality of Service (QoS)

    sBandwidth

    Conclusion 10

  • 8/8/2019 Enabling Secure Virtual Private Networks

    3/12

    E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t

    3

    Introduction

    As a leading vendor of networking

    products, Intel Corporation is committed

    to making the network infrastructure

    better suited for the applications that

    businesses depend on.The Internet iskey to this endeavor. Since the emergence

    of multimedia, the Internet has had an

    unprecedented impact on PCs, appli-

    cations and networking. It now offers

    enormous opportunities for improvements

    in interoperability and cost savings for

    wide area data communications.

    This paper describes the forces that

    are influencing the industry migration to

    Internet-based networking and discusseshow businesses can realize the promise

    of the Internet by using Intel Express

    Routers and tunneling to create

    Virtual Private Networks (VPNs).

    VPN technology opens doors that

    may not have been available to

    companies before, offering increased

    security and reduced costs for

    Wide Area Networking (WAN).

    Intel Express Routers provide one

    of the simplest and most secure VPN

    solutions available today. They require

    no additional hardware or software and

    no changes to the corporate infrastructure

    or network applications.LAN-to-LAN

    communications travel securely over the

    Internet, as easily as standard Internet

    traffic, using virtually any Internet

    Service Provider.

    The Promise ofInternet-BasedNetworking

    Since the advent of the graphical Web

    browser, computer users throughoutthe world have been able to access

    ever-increasing volumes of remote

    information with unprecedented

    ease and sophistication. The resulting

    explosion in the popularity of the

    Internet has helped to create a common,

    standards-based infrastructure for global

    digital communications. This, in turn,

    has launched a spiral of visionary

    promises the fulfillment of which has

    changed computing for the better.

    Affordable wide area networking

    has been one of the Internets key areas

    of promise. By taking advantage of the

    Internet as a common networking envi-ronment, companies can dramatically

    reduce the costs of connecting their

    business sites and teleworkers. This

    savings occurs because the cost of the

    high-bandwidth Internet infrastructure

    is shared among the many companies

    that use it, somewhat like a large,

    cooperatively owned WAN.

    Migration of technologies ontoa common infrastructure

    The clear advantages of globally inter-

    operable email and immediate access

    to worldwide information have quickly

    consolidated the Internets position as a

    vital business tool. Many companies in

    the computer industry already assume

    that customers have Internet connectivity

    and use the ubiquitous TCP/IP networking

    protocol. Thus, the Internet and its

    standard protocols have become a

    common denominator for networking

    applications. This common platform has

    several advantages over the traditional

    model (Figure 1).

    Current and future

    applications migration

    Many applications and even whole

    categories of applications are nowmigrating to the Internet as the common

    platform. For example, email systems

    are shifting from proprietary messaging

    protocols to support Internet-standard

    protocols such as SMTP, POP3 and

    IMAP. Other examples exist in virtually

    every area of networking applications

    (Figure 2).

    The Internet as an

    Applications Platform

    s Standards-based applications

    s Common security architecture

    s Shared/multipurpose components

    s Shared WAN connections

    Figure 1

    Traditional, Proprietary

    Applications Platform

    s Proprietary hardware and software

    s Proprietary security models

    s Disparate components

    s Multiple WAN connections

    Internet-Based Applications

    s Internet VPN

    s Remote access VPN

    s World Wide Web

    s Internet email

    s Internet fax

    s H.323 Internet phone

    s H.323 Internet video phone

    Figure 2

    Todays Applications

    s LAN-to-LAN connectivity

    s Remote LAN access

    s Corporate BBS, public notes, etc.

    s Corporate email

    s Fax, network fax

    s Voice telephony

    s Videoconferencing

  • 8/8/2019 Enabling Secure Virtual Private Networks

    4/12

    The Importanceof Internet VirtualPrivate Networking

    Two key steps allow a company to take

    maximum advantage of the Internet for

    business communications. The first stepis to establish Internet access. The second

    is to take advantage of the Internet for

    networking multiple business sites.

    Internet Virtual Private Networking

    (VPN) can help businesses take these

    key steps, providing secure LAN-to-LAN

    networking at a fraction of the cost of

    traditional long distance connections.

    Until now, this technology has generateda great deal of talk but few actual solu-

    tions that businesses can use.

    Intels line of Express Routers enable

    multi-site businesses to realize immediate

    and tangible benefits from VPN tech-

    nology. They enable secure tunneling

    over any supported WAN or Internet

    link, so businesses can safely and easilyset up private LAN-to-LAN routing

    over the public Internet.

    Tremendous cost savings

    For companies that now use private

    WANs, the dramatic cost savings provided

    by VPNs fully justifies the current excite-

    ment about this new technology. For many

    other companies, the affordability of

    VPN technology offers a way to reapthe benefits of wide area networking

    for the first time.

    A simple cost comparison illustrates

    the magnitude of the potential savings

    using Internet VPNs as opposed to

    traditional dedicated lines (Figure 3).

    As with any service, the opportunity

    for savings varies with the particularcircumstances of each company. In

    general, the greatest cost savings arise

    when dedicated connections to distant

    sites are replaced with local Internet

    connections for each site. The dedicated

    WAN connections from each site to the

    Internet Service Providers (ISPs) point

    of presence (POP) are cheaper because

    WAN services are typically priced basedon distance as well as bandwidth.

    E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t

    4

    Figure 3

    Typical monthly costs for traditional private WAN connections versus Internet access

    Explanation of Charges

    sISDNhas a low monthly rate, but charges 1 to 2 cents per minute plus additional long distance rates. For example:

    GTE in Hillsboro, Oregon, charges $94 for installation and $48 per month for business, plus 1 to 2 cents per minute

    depending on distance and time of day for a local call. Long distance calls for business-to-business connections costthe same as telephone long distance x 2 for 2 B channels (128Kbps).

    So charges for 9 hours/day, 5 days/week are: $48 + (9 hours x 60 = 540 minutes x 20 days = 10800 x $.02 = $216) =

    $264/month. Add long distance at 15 cents/minute = $1,620 + $264 = $1,884/month to connect two offices at 64Kbps.

    $3,504 for 128Kbps.

    Charges for 24 hours/day, 7 days/week are: $48 + (24 hours x 60 = 1440 minutes x 30 days = 43,200 minutes x$0.02 = $864) = $912/month. Add long distance at 15 cents/minute = $6,480 + $912 = $6,571/month to connect two

    offices at 64Kbps. $14,054 for 128Kbps.

    sInternet Access charges are also based on charges quoted in Hillsboro, Oregon. They include $123/month for a full

    time Frame Relay connection plus an Internet access fee of $550/month from an independent ISP or $765/monthfrom GTE, the local Telco.

    Prices shown are as of 7/97, valid only in the United States, and quoted in U.S. dollars. Although we make every effort to ensure that this information is accurate,

    Intel assumes no responsibility for errors of fact or omissions herein. This information is subject to change without notice.

    PRIVATE WAN CONNECTIONS INTERNET ACCESS

    ISDN ISDN Frame Relay (VPN)

    Bandwidth 9 hours/day 24 hours/day 24 hours/day 24 hours/day5 days/week 7 days/week 7 days/week 7 days/week

    64Kbps $1,884 $6,571 $1,276.50

    128Kbps $3,504 $14,054 $3,168.75$673-$888 per link

  • 8/8/2019 Enabling Secure Virtual Private Networks

    5/12

    E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t

    5

    Outsourcing of equipment

    and management

    For many companies, lower WAN service

    charges are only the most obvious benefit

    of establishing Internet VPNs. They

    can also save from less complex WANmanagement. In fact, using the Internet

    for LAN-to-LAN connectivity is a highly

    cost-effective means of outsourcing

    expensive WAN equipment and complex

    WAN link management. Most ISPs offer

    services that include the management

    of the WAN connection between the

    company and the ISPs POP. The ISP

    typically manages all the other connec-

    tions upstream from that point. So

    as a companys bandwidth needs grow,

    its only points of concern are the indi-

    vidual links between its sites and the

    ISP POPs. The ISP is responsible for

    meeting scalability requirements, and

    also for upgrading or reconfiguring

    upstream equipment to take advantage

    of new developments in networking

    technology.

    Integration of applications onto a

    common platform and infrastructure

    Cost savings can also be realized by

    consolidating applications onto the

    common Internet-based networking

    infrastructure. For example, rather than

    needing one ISP connection for Internet

    email and another ISP connection for a

    private WAN link, a single connection can

    be used for both. In the future, the same

    Internet connection and VPN could also

    be used to provide mobile employees

    and teleworkers with secure remote LAN

    access, eliminating the need for dedicated

    remote access servers with numerous

    modems and analog phone lines. A few

    more years down the road, voice tele-

    phony and videoconferencing services

    (which today require a separate network)are likely to make the transition into data

    network services and ultimately integrate

    with Internet VPN services.

    VPNs an excellent WAN

    solution today

    For many businesses, the speed and

    quality of Internet services are more

    than adequate to meet their WAN

    communication needs especiallyconsidering the potential cost savings.

    Current limitations for business use

    of the Internet apply primarily to high-

    bandwidth, time-sensitive transmissions,

    such as audio, video and real-time data

    bases. Even for companies employing

    such applications, it may be highly

    beneficial to establish Internet VPNs

    for their less demanding applications.

    (For more information on quality

    of service and bandwidth issues, see

    The Future of VPNs at the end of

    this paper.)

    Security overthe Internet

    For many businesses considering the

    Internet as their WAN communications

    medium, a lingering concern is security.

    They need to know that their private

    networks are not at risk from unautho-

    rized users and that their private business

    data is secure as it crosses the public

    infrastructure. Although this is a reason-

    able concern given the vast size and open

    accessibility of the Internet, current

    technology offers appropriate security

    for most businesses.

    The most important considerationfor Internet security are:

    sAuthentication Verifying that the

    parties on the other end are who they

    claim to be

    sPrivacy Ensuring that transmitted

    content isnt read or intercepted by

    unauthorized recipients

    sIntegrity Verifying that transmitted

    data is received unchanged

    Many solutions offer security

    technology to make Internet VPNs

    a viable option today. (These solutions

    are discussed later in this paper in the

    section titled Alternative Solutions.)

    Strong security with

    Intel Express Routers

    Intel Express Routers offer powerfulsecurity for Internet VPNs and other

    WAN traffic. Encryption using the

    Blowfish algorithm and a 144-bit

    encryption key is an optional feature

    available for all Intel Express Routers.

    This is some of the strongest encryption

    technology available today, and forms

    the basis for secure tunneling over the

    Internet using Intel Express Routers.Because each Internet tunnel is set

    up as a virtual WAN link, different

    encryption keys can be used for

    each tunnel.

  • 8/8/2019 Enabling Secure Virtual Private Networks

    6/12

    Internet VPNswith Intel ExpressRouters

    Setting up links to ISPs

    Configuring secure VPN tunnels over

    the Internet using Intel Express Routersis exceptionally easy. However, depending

    on the particular circumstances of the

    customers business and LAN config-

    uration, appropriate steps should also

    be taken to ensure the security of the

    LAN from the Internet. This should

    minimally include configuring access

    control lists via protocol filters, but

    could also include more sophisticatedmeasures such as multiple routers and

    standalone firewall servers.

    The first step in creating a secure VPN

    with Intel Express Routers is to establish

    an Internet connection for each LAN.

    This is a traditional WAN connection,

    but typically much less expensive because

    it is a short distance connection to a local

    ISP POP.

    Once the physical connection is

    made, a WAN link must be configured to

    connect the router to the ISPs POP. For

    permanent dedicated connections, this

    is a simple, standard link. It requires

    no special configuration of routers at

    the local ISP POP other than being

    configured as a static route with fixed

    IP addressing.

    When creating an Internet VPN over

    a dial-up link, such as ISDN, there are

    two additional considerations. First, when

    the local ISP at the receiving end of the

    communication receives the transmission,

    it must dial-up the receiving site in order

    to complete the connection. Not all ISPs

    offer this service. Second, both the

    sending and receiving sites must have

    fixed IP addresses. Many ISPs offer

    this as an option for business Internetaccounts, but dont offer it for consumer

    dial-up accounts.

    Once the WAN link to the ISP

    POP has been established, all future

    links can then be configured as tunnels

    over the Internet WAN port. Link options

    such as compression and encryption

    can be enabled and any LAN protocol

    filtering can be specified. Then usersneed only enter the IP address of the

    router at the target site and enter the

    same encryption key on both ends. A

    different encryption key can be used for

    each tunnel for further security. Figures 4

    and 5 show a comparison of a traditional

    WAN setup over a Frame Relay network

    versus an Internet VPN.

    Easy transmission via any ISP

    Once the tunnel is configured, all LAN

    traffic that is routed to the WAN is

    first encrypted and encapsulated in the

    TCP/IP protocol. The traffic is then

    re-encapsulated in whatever WANprotocol is being used on the WAN

    link to the ISP (PPP, Frame Relay, X.25,

    etc.). With this second encapsulation, the

    traffic is indistinguishable from any other

    traffic crossing the link. It can therefore

    travel as easily as standard Internet traffic.

    ISPs dont have to perform any special

    configuration of their equipment. And

    since its encrypted, all data, even the

    original source and ultimate destination

    addresses, are completely hidden from

    potential hackers.

    Tunneling with Intel Express

    Routers can be implemented with any

    networking application over a typical

    Internet connection. Companies dont

    have to modify applications or add any

    E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t

    6

    Figure 4. At each site, a router port is connected to the Frame Relay service, and then a virtual link is

    configured to each of the remote sites.

    Router

    IP, IPX or Bridged LANtraffic encapsulated in PPP,Frame Relay or X.25

    Long distance Private WAN link(PPP, Frame Relay or X.25)

    Router

    Site A

    Site C

    Router

    Site B

    Public Switched

    Data Network PSDN (TELCO)

    Traditional LAN-to-LAN connections over Frame Relay

  • 8/8/2019 Enabling Secure Virtual Private Networks

    7/12

    E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t

    7

    specialized software to their LANs. The

    simplicity and interoperability designed

    into the Intel Express Routers make

    them perhaps the easiest solution avail-

    able today for secure LAN-to-LAN

    connectivity over the Internet.Tunneling LAN protocols

    and filtering

    All LAN protocols and filtering

    supported by Intel Express Routers

    on a traditional WAN link can also be

    supported over a tunnel. Given the

    bandwidth constraints on the Internet,

    its especially important to minimize

    excess traffic with the Express RoutersWAN cost control features such as

    controlled bridging, IPX filtering and

    spoofing, IP filtering and triggered RIP.

    AlternativeSolutions

    With such desirable cost savings, numerous

    VPN solutions are being proposed from

    a variety of sources. VPNs can be imple-

    mented in a number of different ways.Although each solution has its merits and

    shortcomings, Intel believes that the router

    is the best solution for LAN-to-LAN

    connectivity for both the end customer

    and the Internet Service Providers.

    Router vendors

    Because routers are designed for LAN-

    to-LAN connectivity through a WAN,

    providing LAN-to-LAN connectivity over

    an Internet VPN is a natural extension

    of their basic function. A router is

    required for a LAN connection to the

    Internet anyway, so adding VPN support

    in the router requires no additional

    investment for the end customer. And

    since the traffic over the Internet is

    standard, it requires no special configura-

    tion or incremental equipment investment

    for the Internet Service Provider.Not surprisingly, other router vendors

    agree and have announced their intentions

    to support VPNs and secure Internet

    tunneling as Intel has done.

    Application software developers

    and operating systems

    Some software developers are building

    proprietary, secure Internet tunneling

    capabilities right into their applications.

    However, most companies use many

    applications from different vendors.

    Because of this, proprietary VPN

    implementations can quickly create

    administrative headaches and require

    multiple logons and passwords that are

    difficult for users.

    Network Operating System developers

    are also looking to enable VPNs within

    their security infrastructures. To the

    extent that a company is using the same

    operating system everywhere, this may be

    an acceptable solution, but will generally

    require either a dedicated server or

    significant resources on a shared server

    to implement. If multiple operating

    systems are in use, which is the case in

    most companies, then it has the sameshortcomings as the application-based

    implementations.

    Figure 5. At each site, a router port is connected to the Frame Relay service and a real link is configured

    to the ISP POP. Then a virtual link, or tunnel, is configured to each of the remote sites.

    Intel Express Router

    ISPPOP

    PublicInternet

    Secure Internet Tunnel:Encrypted, compressedLAN traffic (IP, IPX,bridged protocols)

    Traditional WANconnection tolocal ISP POP (PPP,Frame Relay, X.25)

    Site A

    Site C

    Site B

    ISP POP

    ISP POP

    IntelExpress Router

    IntelExpress Router

    LAN-to-LAN connections via Virtual Private Network over the Internet

  • 8/8/2019 Enabling Secure Virtual Private Networks

    8/12

    E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t

    8

    Firewall or dedicated devices

    Firewalls were the first product category

    to implement VPN solutions. Since most

    business connections to the Internet

    include a firewall, they might seem an

    ideal place to implement VPNs. Butfirewall-based VPN solutions havent

    caught on with end customers for several

    key reasons. Firewalls are generally

    IP-based and dont provide a means

    of handling other LAN protocol traffic.

    Many firewall-based solutions also

    require per-user licensing, which can

    get very expensive.

    Dedicated devices or black boxes thatencrypt data are also available. They are

    generally designed to fit seamlessly into

    the network, but can be a costly and

    somewhat redundant investment. Their

    tunneling capabilities are similar to those

    of Intel Express Routers but they dont

    offer WAN connectivity or routing.

    Figure 6 summarizes the advantages

    and disadvantages of these alternativeVPN solutions.

    The Internet VPN solution offered

    by Intel Express Routers is simple

    and elegant. Since it is implemented in

    the router, it provides cost savings and

    management efficiencies for the end

    customer. And since it doesnt require

    any changes in the LAN applications

    that the customer is using, or in the ISPsnetwork configuration, there are virtually

    no barriers to implementation.

    VPN Implementation Options

    Figure 6

    Solution Pros Cons

    s Customer depends on the ISPto make changes or additionsto private WAN configuration

    s Require more complicatedconfiguration of customerpremises router equipment

    s Some depend on adoptionof new protocols throughoutInternet infrastructure, delayingimmediate practical use

    s L2TP, for example, willeventually become aninteroperable standardprotocol

    Other router-basedsolutions

    s Most dont support LAN protocolsother than IP

    s Require more complex setupand configuration of firewall ateach site

    s Charges for some are on a per-connection basis, resulting in amuch more expensive solution

    s May require separate log-onprocess for users

    s Some offer support forboth LAN-to-LANnetworking and client-to-LAN remote access

    Firewall-based solutions

    s Because these solutions aretypically still private WANs,the cost savings compared to atraditional private WAN througha telecommunications carrier arenot substantial

    s Customer depends on the ISPto make changes or additions tothe private WAN configuration

    s

    Require more complicatedconfiguration of customerpremises router equipment

    s Because these solutionsare typically still privateWANs, they offer betterQoS guarantees

    s ISP can be paid toconfigure and manageeverything for thecustomer

    ISP-based solutions

    s Require more complex setupand configuration of applications,network security or remoteaccess servers at each site

    s Applications and/or operatingsystems would likely have tobe upgraded to take advantage,adding significantly to imple-mentation costs

    s These types of solutionsmay provide VPN securityusing a common user login

    s PPTP provides supportfor remote LAN accessapplications

    Application-based oroperating system-basedsolutions

  • 8/8/2019 Enabling Secure Virtual Private Networks

    9/12

    E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t

    9

    The Futureof VPNs

    Tunneling with Intel Express Routers

    offers businesses a simple and cost-

    effective solution for Internet VPNs today,

    but its only the first step. As standards forsecure Virtual Private Networking on the

    Internet are formalized, Intel will integrate

    support for them into its routers. Since

    tomorrows innovations are built on todays

    standards, this compliance will offer

    companies optimal flexibility in choosing

    the best future technologies to meet their

    specific needs.

    The next important step for InternetVPNs is providing simple and secure

    LAN access for remote users working

    from home or on the road. Proposed

    standards, such as L2TP, hold great

    promise for allowing Remote LAN

    Access (RLA) via an Internet VPN.

    As mentioned, the Internet already

    offers substantial benefits as a medium

    for WAN communications. But unleashing

    its full potential will require solutions to

    two major limitations. First, the quality

    of service (QoS) available over the

    Internet must be improved to handle

    time-sensitive applications, such as

    audio, video and real-time data base

    applications. Second, higher bandwidth

    services must be available over the

    Internet in order to offer a truly seam-less interface between the LAN and the

    WAN. Intel is playing an active role in

    addressing technical issues in each of

    these areas. The ultimate solutions to

    these problems will require a major

    overhaul of the infrastructure itself

    a change that will come only with

    evolution of the entire Internet.

    Quality of Service (QoS)

    Because administration of the Internet

    is a shared responsibility and the

    network itself is a shared resource

    service providers cant offer any

    guarantees today with respect to latencyor throughput over the Internet. The

    connection from one point to another

    doesnt follow a set path and, like a chain,

    is only as good as its weakest link.

    This shared ownership of the infra-

    structure is both the strength and the

    Achilles heel of the Internet. Its

    responsible for much of the growth

    and vitality of the Internet as apopular medium. But it also means

    that overcoming QoS limitations will

    most likely require technical changes

    throughout the massive Internet

    infrastructure. However, the outlook

    is good. Business and consumer demand

    for improvement is so high that service

    providers and key technology vendors

    are working cooperatively andaggressively to develop solutions.

    QoS over the Internet can be

    improved in many ways. Some ISPs

    offer what are essentially private WANs

    that simply run on the same equipment

    as their Internet traffic. However, the

    typical cost is almost as high as a

    traditional private WAN.

    A number of companies in the

    networking industry have come up with

    a more comprehensive and cost-effective

    solution. Cisco Systems Inc., Intel,

    Microsoft and several major carriers

    and ISPs are playing a leadership role

    in an industry initiative to establish the

    bandwidth reservation protocol (RSVP).

    RSVP offers a standard means of

    obtaining known, guaranteed bandwidth

    over IP network infrastructures. A recent

    study by Infonetics Research predicts that

    the number of ISPs using RSVP will grow

    from 4 percent in 1997 to 24 percent in1998. (Source: Infonetics Research Inc.,

    The ISP Opportunity 1997, page 15.)

    Several Intel Express Router models

    already include support for RSVP, as

    well as IP Multicast V2.

    Bandwidth

    Although the term high-bandwidth

    is used to describe Internet connections

    such as T1, the 1.5Mbps that a T1 con-nection offers is minuscule compared

    to the 10Mbps and 100Mbps Ethernet

    connections enjoyed on local area

    networks. This disparity represents a

    significant bottleneck when establishing

    an Internet VPN or a private WAN. The

    technology to upgrade the infrastructure

    exists, but the enormous cost of upgrading

    or changing the infrastructure of a net-work the size of the Internet poses a

    daunting challenge.

    Typically, the bottleneck occurs at

    the last mile the connection from

    a carrier or service provider to the

    consumer or business location. The

    best hope for improving the bandwidth

    of these connections lies in new, cost-

    effective last-mile solutions such asxDSL, cable or wireless technologies.

    With increasing deregulation of tele-

    phony services, many diverse solutions

    that address the varying needs of

    business and consumer applications

    are likely to emerge.

  • 8/8/2019 Enabling Secure Virtual Private Networks

    10/12

    E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t

    10

    Because of the enormity of the

    problem, significantly higher bandwidth

    for local access may take many years to

    proliferate. But the need for Internet

    VPN solutions today is spurring many

    creative ways to make the most efficientuse of the Internet bandwidth that is

    available. These include compression,

    filtering and prioritization techniques

    used in both WAN and Internet access

    products such as Intel Express Routers.

    Because of the demand for higher

    bandwidth and better QoS for VPN

    applications, many carriers and

    ISPs are already making significantinvestments in their network infra-

    structures to offer better baseline

    services. This is an expensive

    approach to solving the problems,

    but it is effective and immediate.

    Support for new, higher-performance,

    last-mile telecommunications technologies

    such as xDSL and new QoS technologies

    such as RSVP will further enhance theInternet as a common networking infra-

    structure. As these and other solutions

    begin to proliferate through the Internet

    infrastructure, the potential of the Internet

    for WAN communications will continue

    to grow. Intel will continue playing a

    leadership role in this effort.

    Conclusion

    The common infrastructure offered by

    the Internet promises to radically improve

    the ease and affordability of WAN

    communications. Already, VPNs with

    Intel Express Routers offer an importantfirst step by safeguarding the privacy of

    business communications as they traverse

    the public infrastructure. By enabling

    the Internet to be used as a low cost

    alternative to a private WAN, Intel

    Express Routers provide a simple means

    of saving money today. And as part

    of a coordinated, long-term Internet

    strategy, they help lay the groundworkfor the future of network applications.

    Since a complete WAN solution often

    requires more than Internet VPNs, Intel

    Express Routers also support multiple

    protocols for traditional WAN routing

    in a global networking environment.

    With intuitive management tools and

    comprehensive support for strong security

    and cost-control, they provide a flexible,secure and cost-effective WAN solution.

    Intel is also working to drive a range of

    industry-wide efforts to meet tomorrows

    challenges, such as interoperable standards

    for security, quality of service and low-cost

    high-bandwidth communications services.

    With these developments, the solutioncurrently offered by Intel Express Routers

    and secure Internet VPNs will expand

    readily into the future, moving toward

    the next era of WAN communications.

  • 8/8/2019 Enabling Secure Virtual Private Networks

    11/12

    E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t

    11

    Intel Corporation, 1998.

    * Third-party trademarks are the property of their respective owners. Please Recycle.

    Intel Services

    NORTH AMERICAN SERVICE CENTER: OREGON, USA

    Intel BBS 1-503-264-7999

    FaxBack* 1-800-525-3019 or 503-264-6835

    Product Information 1-800-538-3373 or 503-264-7354

    Technicians

    Network and ProShare

    Conferencing/Video Products 1-916-377-7000

    CPU, OverDrive Processors

    and Math Processors 1-800-321-4044

    Phone Hours: 7:00 5:00 M-W, F

    7:00 3:00 Th (US Pacific Time)

    EUROPEAN SERVICE CENTRE: SWINDON, UK

    Intel BBS +44-1793-432-955

    FaxBack +44-1793-432-509

    Product Information +44-1793-431-155

    Technicians Hours (British Time)

    English +44-1793-404-900 (08:00 midnight)

    French +44-1793-404-988 (08:00 17:00, Tu 08:00 16:00)

    German +44-1793-404-777 (08:00 17:00, Tu 08:00 16:00)

    Italian +44-1793-404-141 (08:00 17:00, Tu 08:00 16:00)

    ASIA-PACIFIC SERVICE CENTER: SYDNEY, AUSTRALIA

    Product Information +61-2-9937-5800

    Technicians +1-800-649-931 Hours: 05:00 15:00

    ASIA-PACIFIC SERVICE CENTER: SINGAPORE

    Product Information +65-735-3811

    Technicians +65-831-1311 Hours: 05:00 15:00

    ASIA-PACIFIC SERVICE CENTER: HONG KONG

    Product Information +65-735-3811

    Technicians +852-2-844-4456 Hours: 05:00 15:00

    ASIA-PACIFIC SERVICE CENTER: KOREA

    Product Information +65-735-3811

    Technicians +822-767-2595 Hours: 05:00 15:00

    ASIA-PACIFIC SERVICE CENTER: TAIWAN

    Product Information +65-735-3811

    Technicians +886-2-718-9915 Hours: 05:00 15:00

    JAPAN SERVICE CENTER: TSUKUBA, JAPAN

    Product Information and Technicians

    Network and ProShare

    Conferencing/Video P roducts +81-298-47-0800

    OverDrive Processors and Math Processors 03-5454-1886

    Hours: 09:00 17:00 M-F

    modem settings: 8-N-1, up to 14.4Kbps Or contact your dealer or distributor.

    Intel PC & LAN Products Customer Information and Support Phone Numbers

    or find us on the World Wide Web at http://www.intel.com/network

    FOR ALL OTHER INTERNATIONAL SALES

    AND TECHNICAL SUPPORT QUESTIONS

    Contact your local dealer or distributor or call the NorthAmerican Service center at +1-503-264-7354.

    SUPPORT FILES ON THE INTERNET

    Support information for Intel Brand products is availableon the Internet for downloading by Anonymous FTP andfor viewing or downloading on the World Wide Web.

    World Wide Web address (URL)

    Corporate: http://www.intel.comCustomer Support: http://support.intel.com

    Intel FTP ServerHostname: ftp.intel.comFile directory location: /pub/support/enduser_reseller(For FTP Server access instructions, order document #9051)

    MAILING ADDRESS

    North American Service Center

    Intel Customer SupportJF3-3335200 NE Elam Young ParkwayHillsboro, OR 97124-6497USA

    European Service Centre

    Branded Products Support CentreIntel Corporation (UK), Ltd.Pipers WaySwindon, WiltshireEngland SN3 1RJ

    NOTE: Call our FaxBack service and order document #9089 for a current list of phone numbers.

    CUSTOMER SUPPORT

    Intel Customer Support Services offers a broad selection of programs including extended phone support, upgrades, parts replacement, on-site

    services and installation. For more information, contact us on the World Wide Web at http://support.intel.com or call 800-538-3373, ext. 276.Service and availability may vary by country.

  • 8/8/2019 Enabling Secure Virtual Private Networks

    12/12

    NP0894.01