Critical Considerations for LAN-to-LAN Virtual Private Networks
نویسنده
چکیده
A pivotal paper by Atkinson and Haller in 1994[1] laid the groundwork for secure transmission over the Internet and Virtual Private Networks (VPNs) were born. Infonetics Research, Inc. projects the worldwide market for Virtual Private Networks to reach $32 billion by 2003.[2] There are two primary reasons for the growing interest in VPNs: the cost savings associated with replacing leased lines with packet-switched IP networks and the flexibility of adding geographically diverse sites to the corporate network.[3] As VPNs have gained in popularity, their definition has evolved. Traditionally, VPNs were simply defined as encrypted data connections over a public network.[4] Today, VPNs include all aspects of a network design strategy, including reliability, flexibility, and latency, as well as security.[5] Applications for VPNs fall into three broad categories: access for remote users; intranets, in which a VPN replaces a leased line; and extranets, allowing business partners access to internal applications and data.[6] Many corporations have already implemented VPNs for remote access, as this is the simplest solution, and are moving on to more sophisticated applications which may involve replacing an existing (Wide Area Network) WAN. Since most corporations already have a WAN in place, they have high expectations for reliability, latency, and throughput. These expectations combined with the need for security on the public Internet make VPN requirements very stringent and the design process very important.
منابع مشابه
Impact of Implementing VPN to Secure Wireless LAN
Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE802.11i standard was developed to address the security problems, even though the mistrust of the wireless LAN technology is still existing. The thought was that the best security solutions could be found in open standards ba...
متن کاملService Requirements for Layer 2 Provider-Provisioned Virtual Private Networks
Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document provides requirements for Layer 2 Provider-Provisioned Virtual Private Networks (L2VPNs). It first provides taxonomy and terminology and states generic and general service requirements. It covers point...
متن کاملExtensions to the Virtual Private LAN Service (VPLS) Provider Edge (PE) Model for Provider Backbone Bridging
The IEEE 802.1 Provider Backbone Bridges (PBBs) specification defines an architecture and bridge protocols for interconnection of multiple Provider Bridged Networks (PBNs). Provider backbone bridging was defined by IEEE as a connectionless technology based on multipoint VLAN tunnels. PBB can be used to attain better scalability than Provider Bridges (PBs) in terms of the number of customer Medi...
متن کاملSecurity in Virtual private network
Information security, sometimes shortened to Info Sec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical). Virtual private networks (VPNs) offer low-cost, secure, dynamic access to pri...
متن کاملVirtual Private LAN Service (VPLS) Interoperability with Customer Edge (CE) Bridges
One of the main motivations behind Virtual Private LAN Service (VPLS) is its ability to provide connectivity not only among customer routers and servers/hosts but also among customer IEEE bridges. VPLS is expected to deliver the same level of service that current enterprise users are accustomed to from their own enterprise bridged networks or their Ethernet Service Providers. When customer edge...
متن کامل