EN286A VPN PRIMER 9/5lms.uni-mb.si/~meolic/ptk-seminarske/vpn.pdfIDs, credit card information,...

26
Virtual Private Networking Private Networking

Transcript of EN286A VPN PRIMER 9/5lms.uni-mb.si/~meolic/ptk-seminarske/vpn.pdfIDs, credit card information,...

Virtual Private Networking Private Networking

VirtualPrivate Networking

1

IntroductionEnter another no-brainer application for the Internetenvironment: Virtual Private Networks (VPN). It’s a no-brainer in terms of its low-cost, easy-to-implement, andconvenient solution for mobile and remote businessnetworking. However, the technology it employs isnothing short of brilliant.

This primer is written as a high-level overview of VPNto introduce less technical readers to this innovativeWAN application. The publication is divided into fourmajor sections: VPN History, VPN Technologies, VPNApplications, and VPN Products. Armed with thisinformation, you should be well-poised for educatedinquiry into the VPN service option for your own remotenetworking implementations.

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 1

VirtualPrivate Networking

2

VPN HistoryThe term VPN has been associated in the past with suchremote connectivity services as the public telephonenetwork and Frame Relay PVCs, but has finally settledin as being synonymous with IP-based data networking.

Before this concept surfaced, large corpora-tions had expended considerable resourcesto set up complex private networks, now com-monly called Intranets. These networks wereinstalled using costly leased line services, FrameRelay, and ATM to incorporate remote users.For the smaller sites and mobile workers on theremote end, companies supplemented theirnetworks with remote access servers or ISDN.At the same time, the small- to medium-sized

enterprises (SMEs), who could not afford dedicated leasedlines, were relegated to low-speed switched services.

As the Internet became more and more accessible andbandwidth capacities grew, companies began to offloadtheir Intranets to the web and create what are nowknown as Extranets to link internal and external users.However, as cost-effective and quick-to-deploy as theInternet is, there is one fundamental problem – security.

Today’s VPN solutions overcome the security factor.Using special tunneling protocols and complex encryp-tion procedures, data integrity and privacy is achieved inwhat seems, for the most part, like a dedicated point-to-point connection. And, because these operations occurover a public network, VPNs can cost significantly lessto implement than privately owned or leased services.

Although early VPNs required extensive expertise toimplement, the technology has matured already to alevel that makes its deployment a simple and affordablesolution for businesses of all sizes, including SMEswho were previously being left out of the e-revolution.

Corporate networking hascome a long way in arelatively short time.

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 2

VirtualPrivate Networking

Source and destination addresses, other information

By capturing these addresses, a hacker can learn the addresses of target servers and tryto set up unauthorized communications with them. A hacker can also learn the addresses of authorized users anduse these addresses to impersonate authorized clients.

Information useful to hackers

Other headers contain informationused by hackersto attack an enterprise’sWeb sites, and, therefore mustbe encrypted before traveling over the Internet.

Passwords, user IDs, credit card information, confidential information,all other data

The user datapart of thepacket contains not only all of an organization’s business data but also its user IDs and passwords.

User DataOther Header IP Header

Anatomy ofan IP Packet

Using the Internet, companies can connect their remotebranch offices, project teams, business partners, ande-customers into the main corporate network. Mobileworkers and telecommuters can get secure connectivityby dialing into the POP (Point-of-Presence) of a local ISP(Internet Service Provider). With a VPN, corporations seeimmediate cost-reduction opportunities in their longdistance charges (especially important to global compa-nies), leased line fees, equipment inventories (like largebanks of modems), and network support requirements.

VPN TechnologiesWhether you implement your own VPN or outsource toyour ISP (more about that later), you’ll want to be familiarwith the basic technologies involved.

The Internet is a shared public network of networkswith open transmission protocols. Therefore, VPNs

must include measures for packet encapsulation(tunneling), encryption, and authentication

to ensure that sensitive data reaches itsdestination without tampering byunauthorized parties.

3

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 3

VirtualPrivate Networking

4

Companies using an Internet VPN establish links to the local access points of their ISP. From here, they let the ISPensure that the data is transmitted to the appropriatedestinations via the Internet, leaving the rest of the con-nectivity details to the ISP’s network and the Internetinfrastructure.

Firewall:A firewall is an important security feature for any Internetuser. Available in software or standalone hardware forms,a firewall prevents unauthorized users and/or data fromgetting in or out of your network, using rules to specifyacceptable communications from locations, individuals,or in certain protocols. However, firewalls do not protectyour data from threats within the Internet network itself.Once the data gets outside your firewall, your usernames, passwords, account numbers, server addresses,and other sensitive information are visible to hackers.VPN tunnels, enabled by encryption algorithms, give youthe ability to use the public, shared Internet for securedata transmission after it leaves the protective custodyof your firewall.

Tunnels:The thing that makes a Virtual Private Network “virtuallyprivate” is a tunnel. Even though you access your networkvia the Internet, you’re not really “on” the Internet, youare actually “on” your company network. Although theterm “tunnel” feels like it’s describing a fixed paththrough the Internet, this is not the case. As with anyInternet traffic, your VPN tunnel packets may take differ-ent paths between the two endpoints. What makes a VPNtransmission a tunnel is the fact that only the recipientsat the other end of your transmission can see inside yourprotective encryption shell, sort of a “tunnel vision” idea.

Tunneling technology encrypts and encapsulates yourown network protocols within Internet protocol (IP). Inthis way, you can route and bridge, enable filters, and

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 4

VirtualPrivate Networking

deploy cost-control features the same way as any of yourother traditional WAN links. So, not only is the Internet-based VPN transmission transparent to your users, it isvirtually transparent to your network managementoperations, as well.

Encryption:Encryption is a technique for scrambling and unscram-bling information. The unscrambled information is calledclear-text, and the scrambled information is calledcipher-text. At either end of your VPN tunnel sits a VPNgateway in hardware of software form. The gateway at thesending location encrypts the information into cipher-text before sending the encrypted information throughthe tunnel over the Internet. The VPN gateway at thereceiving location decrypts the information back intoclear-text.

In the early days of VPN tunneling, companies kept theirencryption algorithms secret. Unfortunately, once it wascracked, all the information ever encrypted with that for-mula became vulnerable. Therefore, the industry beganpublishing well-known and well-tested encryption algo-rithms, such as the popular Data Encryption Standard(DES).

But, if everyone knows the encryption algorithm, how isthe data kept secure? The answer: keys.

5

The Data Encryption Standard (DES) uses 56-bit symmetric keys to encrypt data in 64-bit blocks. The 56-bit

key provides 72,057,594,037,927,900 possible combinations. This sounds impressive, and it would take up

to 20 years for typical business computers to run this many combinations. But, more focused, well-funded

hacker organizations with a bigger inventory of powerful computers could break it in about 12 seconds.

DES has been developed even further with its 3DES (“triple-DES”) system that encrypts information

multiple times. For example, with 3DES, the data is encrypted once using a 56-bit key. The resulting

cipher-text is then decrypted using a second 56-bit key. This results in clear-text that doesn’t look anything

like what was originally encrypted. Finally, the data is re-encrypted using a third 56-bit key. This technique

of encrypting, decrypting, and encrypting (EDE) increases the key length from 56 bits to 168 bits.

DES and 3DES

Encryption

Algorithm:

mathematical

function that

establishes the

relationship

between the

encrypted

message and

the decrypted

message.

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 5

6

VirtualPrivate Networking

Keys:A key is the secret code that the encryption algorithm usesto create a unique version of cipher-text. To put it in sim-pler terms, two people might go to the hardware store andbuy the same lock off the shelf, but their combinations aredifferent. In VPN encryption, the method may be the same(like the lock), but our keys are different (like the combination).

Of course, VPN locks have a lot more than three numberson the combination dial. As a matter of fact, transmissionsecurity strength depends on the length of the keys youuse. Here’s the formula:

• 8-bit keys = 256 combinations or two to the eighth power (28)

• 16-bit keys = 65,536 combinations or two to the 16th power (216)

• 56-bit keys = 72,057,594,037,927,900 or two to the 56th power (256)

• And so on…

In other words, if you used a 16-bit key, an intruder mighthave to make 65,536 attempts at cracking your combina-tion. Obviously, this would be a quick and fairly simpletask for computers. That’s why a lot of VPN products onthe market today are using 168-bit keys, creating 374,144,419,156,711,000,000,000,000,000,000,000,000,000,000,000,000possible combinations. There are some enterprises outthere going even higher. Even the fastest computers todaywould need extended time to crack a code that complex.

You might be tempted to make a policy of always using thehighest-bit encryption method available, but keep in mindthat processing such complicated cipher-text will requiresignificant, dedicated CPU processing power. There areother ways to use keys to the utmost security to fit yourneeds. For example, it does, indeed, take time to crack thehigher-bit keys. If you establish a policy of periodicallychanging your keys, the trespassers won’t be ableto keep up.

But what is a

key and what

does it look

like?

Similar to

Einstein’s Theory

of Relativity,

there is only

a handful of

people who truly

understand what

keys fundamen-

tally are. It

involves such

impressive math,

that most of us

just have to

accept that they

work. There’s an

entire world of

standards and

granularity out

there that could

fill libraries of

technology

primers. Bottom

line, keys are

software-gener-

ated encryption

algorithms.

Luckily, reliable

hardware and

software ven-

dors are provid-

ing standards-

based key-manage-

ment features in

their products

that your cur-

rent networking

employees can be

easily trained to

maintain. Take

care to partner

with suppliers

you trust.

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 6

7

VirtualPrivate Networking

The period of time you use a particular key is called acrypto-period. Some crypto-periods are changed at a par-ticular volume-level of transmitted data. Some change atthe beginning of each new session or even at a lull withinthe transmission. The danger in frequent key generation isthat the likelihood of key-code disclosure increases themore you re-key. So, that’s where another creative use ofkeys comes in handy. It involves what are called symmetri-cal and asymmetrical keys.

Symmetrical KeysSymmetrical keys means the same key is used at each endof the tunnel to encrypt and decrypt information. Becausea symmetrical key is being shared by both parties, theremust be an understanding between the two to take appro-priate steps to keep the key secret, which is why symmet-rical keys are often referred to as “shared secrets.” Thesekeys become more difficult to distribute, since they mustbe kept confidential. A technique called “key splitting”may be employed to reduce the potential of key disclosureduring transit. This allows participants to use public chan-nels such as the Internet. More commonly, however,distribution of symmetrical keys is more of a manualoperation using paper, removable media, or hardwaredocking.

Asymmetrical KeysAsymmetrical keys are slightly more complicated, but,logistically, much easier to manage. Asymmetrical keysallow information to be encrypted with one key anddecrypted with a different key. The two keys used in thisscenario are referred to as private and public keys, or theones you keep to yourself and the ones you distributeto your remote users.

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 7

8

VirtualPrivate Networking

Consider this example:

Let’s call our businesses ACME and ABC. ACME

has a set of two keys, a public key and a private

key. His public key has been programmed to

encrypt data so that only his own private key can

decipher it. In order to communicate securely,

ACME hands his public key to ABC and tells him

to encrypt anything he sends with that code.

Using this asymmetrical keying method, both are

assured that only ACME will be able to read those

transmissions because he retains the private

decoder key. If the communication is to be

bi-directional, ABC would share his public key

with ACME in the same manner.

Key ManagementConfiguring pre-shared secrets in smaller VPNs does notnecessarily require software automation or large infra-structure investments. However, larger networks mightbenefit from deploying a Public Key Infrastructure (PKI)to create, distribute, and track digital certificates on aper-user basis. You can use pre-shared keys or raw digi-tal signatures if your equipment supports these authen-tication alternatives. However, if you decide to use cer-tificates, there are options. For example, you may usethird-party Certificate Authority services. Or, you maybuild your own Certificate Authority using software fromEntrust, Xcert, or Baltimore Technologies. Either optionwill help you establish a comprehensive PKI, which isespecially useful in large organizations needing toextend secure, limited network access beyond their owninternal users to business partners and customers.

Digital

Certificates:

a virtual

security

procedure

that verifies

an association

between a

user’s public

key and the

user’s identity

and public

privileges.

With asymmetricalkeys, businesspartners trade theirpublic keys butretain their privatekeys for securetwo-waycommunications.

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 8

9

VirtualPrivate Networking

AuthenticationThe last bit of housekeeping involved in VPN transmis-sion is authentication. At this step, recipients of datacan determine if the sender really is who he says he is(User/System Authentication) and if the data wasredirected or corrupted enroute (Data Authentication).

User/System AuthenticationConsider, again, our two businesses named ACME andABC. When ACME receives a message signed from ABC,ACME picks a random number and encrypts it using akey only ABC should be able to decode. ABC thendecrypts the random number and re-encrypts it usinga key only ACME should be able to decode. When ACMEgets his number back, he can be assured it really is ABCon the other end.

Data AuthenticationIn order to verify that data packets have arrived unal-tered, VPN systems often use a technique involving“hash functions.” A hash function creates a sort offingerprint of the original data. It calculates a uniquenumber, called a hash, based on fixed- or variable-length values of unique bit strings. The sender attachesthe number to the data packet before the encryptionstep. When the recipient receives the data and decryptsit, he can calculate his own hash independently. Theoutput of his calculation is compared to the storedvalue appended by the sender. If the two hashes donot match, the recipient can assume the data hasbeen altered.

Hash functionscreate a finger-print of your datathat can be usedfor authentication.

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 9

10

VirtualPrivate Networking

IPSec ProtocolIPSec (IP Security) is the Internet standard protocolfor tunneling, encryption, and authentication. It wasdesigned to protect network traffic by addressing basicusage issues including:

• access control• connection integrity• authentication of data origin• protection against replays• traffic flow confidentiality

The IPSec protocol allows two operational modes. InTransport mode, everything in the packet behind andnot including the IP header is protected. In Tunnel mode,everything behind and including the header is protected,requiring a new pseudo IP header.

While the IPSec protocol was under development, twoother protocols — L2TP and PPTP — arose as temporarysolutions. L2TP (Layer 2 Tunneling Protocol) enclosesnon-Internet protocols such as IPX, SNA, and AppleTalkinside an IP envelope. However, L2TP has to rely on otherprotocols for encryption functions. PPTP (Point-to-PointTunneling Protocol), is a proprietary Microsoft encryptionand authentication protocol. Although originally devel-oped as a temporary solution, Microsoft continues todeploy L2TP as its tunneling protocol instead of IPSectunneling. When comparing the three, IPSec is, by far, themost widely used protocol, and the only one that addressesfuture VPN environments (such as new IP protocols).

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 10

11

VirtualPrivate Networking

ManagementUnderstanding the operational technologies is only partof implementing a successful VPN, but the managementof the devices you deploy can sneak up to be yourlargest investment in terms of the time and personnelrequired. As you can imagine, the bigger your VPN andthe more granular your security policies, the more com-plex your management needs become.

For example, consider the seemingly simple additionof one new site to a 50-site meshed VPN. The networkmanager might have to manually configure each indi-vidual VPN tunnel establishing two-way communicationbetween the new site and each of the other 50 boxes.That’s 100 different policies to add a single node to ameshed network. And that’s just creating the tunnel.But network managers have to plan for much morethan just each workstation’s IP address, they must alsopublish and enforce comprehensive security policies.

Security policies define acceptable access privileges,which may depend upon combinations of factorsincluding job titles, special projects, need-to-know, andlevel of trust. In addition, policies should be granularenough to allow differentiation by organization, server,group, and even user levels. Keep in mind, however, thatyou’re trying to walk a fine line between limited accessand collaborative computing. Your policies should pro-tect your resources at the highest level possible withoutjeopardizing employee productivity.

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 11

12

VirtualPrivate Networking

In order to implement your VPN effectively and effi-ciently, device management is best handled with dedi-cated VPN management software. Several packages areavailable, but are typically associated with specific ven-dors’ products. When evaluating these managementplatforms, be sure to look closely at auto-policy settingand configuration capabilities accommodating branchoffices and remote clients, as well as intuitive GUI thatclearly depicts your VPN map and the policies currentlyin place. You might also consider functionality that pullsuser groups and authorizations from existing databasesto reduce set-up time.

Element-Based or Policy-Based Management?This is one area where you live by the rule, “The simplerthe better.” For smaller, site-to-site VPN implementa-tions, the less expensive element-based (device-by-device) management and monitoring systems are ade-quate. You may even consider a hybrid middle-groundapproach of element-based configuration with central-ized reporting and monitoring functions. In other words,you may have to configure each individual tunnel anddevice one at a time. But, once established, you cancentrally monitor intrusion attempts, VPN tunnel failures,concurrent tunnel reports, and software validations,without having to request the information manually,device by device.

For larger networks, centralized policy-based manage-ment is a must. With centralized policy-based systems,you have the ability to establish policies and then pushthem out to all the applicable devices with a single com-mand. Not only does this save incredibly significant

When evaluating VPNmanagement softwarepackages, look for theabove.

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 12

13

VirtualPrivate Networking

amounts of time, it also prevents the increased likelihoodof misconfigurations that can happen when administra-tors have to enter hundreds of individual commands.

Outsourced ManagementAnother way to deal with large-scale VPNs is to out-source managed VPN to your ISP or a Secure ApplicationService Provider (SASP). These services generally come intwo packages: CPE-based VPNs or Network-based VPNs.

When your provider designs a VPN solution for you,installs a security gateway (firewall, router, and VPNdevice in some configuration) and then manages it onyour behalf, it is called a CPE-based VPN. In contrast, anetwork-based VPN uses carrier-class VPN switches,embedded at ISP points of presence or telco centraloffices to support hundreds of thousands of high-speedtunnels. Creating a network-based VPN is accomplishedby reconfiguring the switch instead of placing equip-ment at your site.

Some corporations prefer to outsource these services toproviders with management infrastructures already inplace. In this case, your cost lies more in recurringmonthly fees rather than in capital investment. Becausethis is a relatively new service offering, managed servicescome in many shapes and prices. Shop carefully. (Moreinformation about Outsourced VPN begins on page 19.)

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 13

14

VirtualPrivate Networking

VPN ApplicationsRemote AccessBusiness professionals who travel frequently or whooften work at home after hours find this solution to beof great benefit to their ability to get things done. Nomatter where they are, secure access to their entire busi-ness is only a local telephone call away. This is also auseful solution for cases where key personnel need to beaway from the office for an extended period of time.

Remote Access Before VPN

Connections for mobile and remote users have tradi-tionally been achieved using analog or ISDN switchedservices. Small offices that could not afford permanentconnections to the corporate Intranet would also usethese dial-up technologies.

The long distance charges would be the largest cost ofthis type of remote connectivity. Other costs includeinvestment in a Remote Access Server (RAS) at thecentral site as well as the technical support personnelnecessary for configuring and maintaining the RAS.

PCPSTN

RouterModem

Max. 56/64K

Ethernet LAN Remote Access Server

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 14

15

VirtualPrivate Networking

Remote Access After VPN

Remote users can establish dial-up connections to localISPs and connect, via the Internet, to a VPN server atheadquarters. Using today’s faster Internet connections(DSL or cable), employees access corporate resources atspeeds well exceeding 500 kbps. Under most conditions,this is like being at a desk in the corporate headquartersbuilding. VPN enables mobile and remote employees towork faster and more efficiently.

In this application, the VPN benefits include replace-ment of long-distance or 800-number services, elimina-tion of the need for remote access servers and modems,and access to all enterprise data and applications (notjust email or file transfer servers). Studies show that thecost savings in long-distance charges alone pay for theVPN setup costs within a few months, and substantialrecurring savings follow.

InternetRouter

EthernetCable or DSL Ethernet

VPNGateway

VPNGateway(Firewall)

Ethernet LAN

ModemMobile Worker

BroadbandModem

Small Office/Home Office

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 15

16

VirtualPrivate Networking

Site-to-Site ConnectivityThe global business village of today’s marketplace oftenrequires companies to establish regional and interna-tional branch offices. The options have traditionallybeen either to deploy dedicated leased-line services orto use the same dial-up technologies as mobile workers.In addition to the infrastructure costs attached to thisscenario, businesses have also had to consider thelost-opportunity costs associated with inefficient ornon-existent access to centralized information andapplications.

Site-to-Site Before VPN

To connect branch offices to headquarters, businesseswould previously outfit each remote location with arouter that connected the campus to a backbone routerover a LAN or WAN link. The remote routers also con-nected the branch office with the other remote loca-tions. All these routers were often connected with a webof leased line or Frame Relay service.

The costs for this configuration included the campusand backbone routers as well as the charges for telecom-munications services, most significantly, the long dis-tance charges. The initial investment in an Intranetbackbone alone might cost anywhere from $10,000 to$100,000, depending on the traffic and geographicalreach.

Frame RelayWANRouter Router

Ethernet LAN Ethernet LANInternet

Access DeviceDSU/CSU

T1 Leased

Line

T3 Leased

Line

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 16

Site-to-Site After VPN

Using a VPN solution for this application, the backboneWAN, and its associated hardware, is replaced by theInternet. Each remote location incurs the cost of anInternet connection, but even the fastest DSL, cable,and ISDN connections only cost approximately $40 permonth (some ISP business rates vary and may be slightlyhigher). Using the Internet pipeline, you also eliminatethe backbone routers and their system administration,configuration, technical support, and routing-tablemaintenance. Performance is also likely to be enhancedin this application thanks to the higher-speed facilitieswithin the Internet network. The Return on Investment(ROI) for this application is quick and also provides forrecurring savings.

VPN ProductsYou’re sold, right? VPN sounds like the perfect solutionfor your remote connectivity. Now it’s time to take a lookat the shopping list. Before you make any purchases oradjustments in your operations, you’ll need to investi-gate whether it’s more appropriate for your company toimplement its own VPN system or outsource it to yourISP or other network service provider.

Do-it-Yourself VPNWhen implementing your own VPN, there are four basicareas to consider: the Internet service itself, a securitypolicy server, a PKI system, and a VPN gateway solution.

InternetRouter DSU/CSU

or BroadbandModem

VPNGateway

VPNGateway

Ethernet

Ethernet LAN Ethernet LAN

17

VirtualPrivate Networking

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 17

18

VirtualPrivate Networking

Gateway products fall into two categories, standaloneand integrated. Standalone VPN implementations incor-porate purpose-built devices sitting between the sourceof the data and the WAN link. At the remote end, theremay be VPN software for a mobile user’s laptop, or apurpose-built encryption device between the modemand the data source at a remote office.

Integrated implementations add VPN functionality toexisting devices such as the router and firewall, stillcomplemented by remote client software.

VPN Gateway: The RouterAdding encryption support to a router can keep theupgrade costs of your VPN low. Depending on whetherthe functionality can be added to an existing router withsoftware or special expansion boards, the cost mightrange from approximately $1,500 to $4,000.

VPN Gateway: The FirewallUsing firewalls to create a VPN is a workable solutionfor small networks with low traffic volume. However,because of the processing performed by firewalls, theycan be ill-suited for tunneling on large networks with agreat deal of Internet traffic. An integrated firewall canlist from less than $1,000 up to $21,000, depending onthe throughput performance you need.

VPN Gateway: The Internet Security DeviceStandalone VPN devices specifically designed for tunnel-ing, encryption, and user authentication are much easierto set up than installing software on a firewall or recon-figuring a router. Large enterprises have a variety ofoptions in VPN devices for throughput and simultaneous

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 18

19

VirtualPrivate Networking

tunnel management. Small businesses or small officeswithout IT support staffs should look for turnkey prod-ucts that incorporate VPN functions with firewall andother network services. Depending on the combinationsof VPN features, Internet security device packages cancost as little as $500 or as much as $35,000 (for higher-capacity systems).

VPN Gateway: The SoftwareVPN software for creating and managing tunnels isavailable for use between a pair of security gateways ora remote client and a security gateway. These softwareVPN systems are good low-cost choices for relativelysmall tunnels that do not have to process a lot of traffic.The software can run on existing servers and share sup-port resources with them. Software solutions are also agood stepping-off point for network managers wishingto be more familiar with VPNs. VPN software, againdepending on the features included, may range from$21 per seat to $2,500 per server.

Outsourced VPNBuying VPN service from a provider is a relativelynew option. Companies without adequate supportpersonnel, or who don’t want to be distracted from thebusiness-of-the-business, can outsource to their ISP.When researching this alternative, there are a fewimportant considerations to remember:

• If you are connecting offices or workers in remotecities or countries, you’ll need an ISP that offersPOPs in those locations (keeping the Internet to alocal call, rather than using toll-free connections).

• Look for providers with redundancy in equipment,connections, and people.

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 19

20

VirtualPrivate Networking

Outsourced VPN pack-ages come in all shapesand sizes making theofferings a challenge tocompare.

• Investigate your provider’s policies, equipment/soft-ware, and employee qualifications for dealing withoutside attacks.

• Inquire about on-site consulting assistance to helpensure you’re getting the services you need basedon your specific applications.

Pricing for this service is based on several factors, anddifferent service providers package those differently.IDC published an analysis of VPN services (IP VPNServices: U.S. Market Assessment and Forecast, 1999-2004) outlining a number of pricing schemes from theleading ISPs. According to that report, pricing structuresare developed based on flat-rate monthly fees, usage,and even a la carte offerings. Although the dollaramounts fluctuate with market conditions, here’s asnapshot of how the prices have run and what deter-mines them:

• Provider A offers VPN services for $10/month peruser (including technical support). There is an $80set-up fee per remote user, and the Internet con-nection is extra. Provider A also offers a three-yearcontract for T1 connection and managed VPNservices for $2,300/month per site.

• Provider B offers a dial-up VPN plan for $2.50/hourto $4.25/hour with negotiable usage discounts.

• Provider C offers firewall service from $800/monthfor up to 25 users to $2,500/month for unlimitedusage licenses. Encryption equipment rental costsapproximately $250/month. A Quality of Servicecontract runs $1,500/month for 256-384 kbpsservices up to $35,000/month for T3 services.Installation fees are based on the cost of the truckroll, and DSL service costs between $129/monthto $250/month.

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 20

21

VirtualPrivate Networking

• Provider D offers fully managed VPN service for$2,750/month per site. Installation costs $5,000 perU.S. site and $7,500 per international site. T1 rateswere $995/month per U.S. site and $1,595/monthper International site. The CPE rental fees were$995/month per site for up to 200 users and$3,300/month per site for T3 capacities.

• Provider E offers a variety of term contracts. Theone-year VPN contract costs $950/month per sitefor low-capacity applications and $3,300/monthper site for high-capacity applications. Connectivityport fees (e.g., $1,200/month for T1) and local loopcharges are extra. Installation fees run from $500 to$1,500 per site.

QoS NoteThe Internet is a complex environment with an enor-mous mixture of data and real-time applications movingin different paths through unknown infrastructures. Youhave to expect that there will be bottlenecks and conges-tion. QoS generally encompasses bandwidth allocation,prioritization, and control over network latency for net-work applications. But, the Internet is a “connectionless”technology that makes no guarantees. When you’retransmitting mission-critical files that need to get totheir destination without delay, QoS becomes an impor-tant part of your VPN implementation. IPv6, the nextversion of IP, is expected to change all that by includinginherent provisions for QoS, but is not widely used as ofthis writing. That’s why, if QoS is important for your VPNobjectives, you should separate your QoS requirementsfrom your VPN requirements. In other words, select anISP that provides an adequate service level agreement(SLA) for your performance expectations, and then,select the most cost-effective, manageable, and flexibleVPN service solution separately. As you’ve seen earlier,these services are available as separate products, so lookclosely at each requirement.

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 21

22

VirtualPrivate Networking

Making the MoveThe question is no longer whether to migrate to anInternet-based business model, but what is the best wayto set up your e-environment. With expanding businessrelationships, even small companies are defining and

implementing their own e-strategies.In this process, they’re finding thattheir IP communications are involv-ing much more than just Internetaccess, email, and file transfer.Today, businesses need real-timeexchange of mission-critical infor-mation such as procurement, sup-ply-chain management, sales andcustomer relationship management,online business transactions, onlineaccess to financial institutions, etc.These applications make securityover the Internet paramount.The technology that enables thoseobjectives is VPN.

When making your decision to move to a VPN structure,consider the key business benefits of VPN connectivity:

Lower costsAccording to Infonetics, LAN-to-LAN connectivitycosts are reduced 20 to 40 percent, and remoteaccess costs up to 80 percent. For companies justsetting up their remote networks, VPN also offersa low-cost alternative to investment in backboneequipment, in-house terminal equipment, andaccess modems.

The average dollar amount lost per organizationin the past year by type of security breach, accordingto a 2001 survey of 538 U.S. security professionals:

Financial fraud

Theft of proprietary information

System penetration by outsider

Unauthorized insider access

Viruses

Denial-of-service attacks

Laptop theft

$8.0 million

$2.9 million

$454,000

$276,000

$244,000

$122,000

$62.000

Money Drain

Source: Computer Security Institute/FBI, March 2001

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 22

23

VirtualPrivate Networking

Anywhere, anytime accessThe ubiquitous public Internet offers remote userstransparent access to central corporate systems suchas email, directories, internal and external web sites,security, and other shared applications over round-the-clock local access services.

Connectivity ImprovementsVPN-based links are easy and inexpensive ways tosupport changing business demands. Extendingcorporate network services to new offices or mobileworkers, adding new vendors, or removing usersare simple tasks that are quick to achieve.

VPN technology is maturing rapidly and represents thewave of the future for data communications. It is cost-effective and safe, and its high return on investment willlikely outweigh any skittishness about investing in anew technology.

For more

information or

for assistance

in designing

your own VPN

solutions,

call ADTRAN’s

highly-skilled

pre-sales

applications

engineers at

800 615-1176.

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 23

24

VirtualPrivate Networking

About ADTRAN®

Established in 1985, ADTRAN, Inc. is a leading providerof network deployment and access solutions for deliver-ing today's digital telecommunications services overexisting copper infrastructures.

Today, ADTRAN technologies support more than twomillion local loops worldwide. More than 500 ADTRANproducts support all major digital technologies, includ-ing T3, T1, E1, Frame Relay, VPN, DDS, HDSL, xDSL,ISDN, and wireless transport. In the carrier networkand enterprise markets, ADTRAN produces a completeend-to-end solution that provides the greatest networkefficiency and lowest possible telecommunications costs.

According to Dataquest and IDC, ADTRAN holds rev-enue-leading positions in the Integrated Access, FrameRelay/DDS, ISDN Extension and HDSL/T1/E1 networkand access markets. ADTRAN customers include theRegional Bell Operating Companies, interexchangecarriers, GTE, domestic independent service providers,corporate end users, international customers andoriginal equipment manufacturers.

Visit us on

the web at:

www.adtran.com

EN286A VPN PRIMER 9/5 9/6/01 11:10 AM Page 24

CORPORATE OFFICEADTRAN, Inc.901 Explorer BoulevardP.O. Box 140000Huntsville, AL 35814-4000

800 9ADTRAN256 963-8000fax: 256 963-8699fax back: 256 963-8200e-mail: [email protected] site: www.adtran.com

REGIONAL OFFICESChicago, IL 800 436-4217Seattle, WA 800 390-1573Washington, DC 800 794-9798

FIELD OFFICESAtlanta, GA 800 289-0966Chicago, IL 800 471-8655Columbus, OH 888 865-2237Dallas, TX 800 471-8648Denver, CO 800 471-8651Irvine, CA 800 788-5408Kansas City, KS 800 471-8649Los Angeles, CA 888 223-7668Nashville, TN 888 223-7657New York, NY 800 471-8657Portland, OR 888 223-7660Richmond, VA 800 689-9915San Jose, CA 888 223-7655

INTERNATIONAL CONTACTSBeijing, China 8610 8529-8895Canada 1 877 923-8726 Germany 49 6007 930-203Hong Kong 852 2824-8283Latin America 1 954 474-4424London, U.K. 44 1252 626-730Melbourne, Australia 61 3 9658-0500Mexico/Caribbean 1 954 577-0357Zürich, Switzerland 41 1 880-2777

©2001 ADTRAN, Inc. All rights reserved. ADTRAN is a registeredtrademark of ADTRAN, Inc. All other trademarks metioned in thispublication are the property of their respective owners.EN286A September 2001