Young Love 2000
Young Love 2000
Young Love 2000
VPNs are hot, and for good reason. They promise to help organisations
more economically support sales over the Internet, tie business partners
and suppliers together, link branch orfices with each other, ancl support
telecommuter access to corporate network resourccs.
I
11 1999 ccii-po”ations Iioiight $281 iiiillion worth ;iniount of iicccss equipment rcquirctl, and give managers
ol virtiial private nct~vork(VL’N) liard\vv;iuc, and better i:oiitroI over their lay-flung nctworlts.
that to $831 Iiy the end ol this
year, according to Inkinctics. C;ititici-s In-Stat Crouli What is required to construct a VPN?
predicts the total in;irkct for Vl’N gcar antl scrvicrs will
,.LWO major clcincnts arc ncccssary to c:onstruct a VI”:
explode h i ii projcc~ctl$267 ii tuiiiiclling protocol and ii 1iie:iiis to authmticalc that
Iiillion by the end ol 2003. h h e c tunncl origin. 7imlzeliiiig is 21 mcthod for scnding data
biteriiei WM sin’vey oi 200 I’l‘ niai1agci.s [ound that 29% pacltck securely o w the Interiirt or othor p u l i k
were already using VI’Ns, while the remaining 7 1 ?O WCI’C ~ictworlt./ I
tuniiclling pi-otocol eiic;ipsulates dala pacltets
six months to one y c x o r more away frmi dcployiiicnt. with iiiform;ition that providcs routing data eii;ililing the
What, cxactly, is ii VI”? /\ good woi-king dclinitioti is as encalisulatcd payload to tr;ivcrsc the iirtwol-lc securely.
lollo\vs: Tock1~7tlic choice is priiiiarily bctwccii two tuniielling
~,rolocols, hl~lll dcvelo~,rd by Ihc IETF (l11ternct
A virtual private iictworli is ii coinliinatioii ol tuiincl- Thgiiiecring Task l h ~ (litt~)://~~\v\v,ictf.~~rg):
~)
ling, encryption, autliciitidioii aiitl ;i(:ccss con1rol weti
to carry traliic o\wr the Intorncl (or a iiimaged 1iitc”A (?)I.%?‘/’ (/,Uy?l’ % / Z l i 2 I ? 1 ~ / 1 ~~/71’~l J ~ O i ‘ O i )
protoc:ol (11’) iictwork or a provider’s Iiacltbonc:). 1,2’1‘11 is ii network protocol tlrat mcnpsul;itcs 1 T I I
(point~to-poiiitprotocol) {riimcs to Iic sent 0 1 7 ~ 1 - 11: X.25,
Simply stated, ii VL’N gives 11. a s~’cU1’cw a y to al:ccss lramc relay, or iYIW1 (;isynclironous trarisler mode)
corporatc tiet\vorlt rcsour(:cs over tlic Intcriiet or othcr networks. (layer 2 rrlcrs to thc data link layer ol the OS1
public or private iirl\vorks. model; layer 3 is the iirtwork layer.)
260
NETWORKS
NETVORKS
mi-cls or tligitiil ccrtilicates. Sharcd secret is fairly easy to tloc:utiicnts loi both opcrational guidaiicc and aidit
utilise for ii sinall iiuiiilm of endpoints (clieiits mdior purposes. Second, if yiu ever wish to cross-certirj7(that is,
gateways).’liikon cards work vory well lor liirgc intrarict l)c treated iis iiii ccjual ancl iil~loi o iicccpt certiliciitcs) with
iiiil)lciiientatioiis, 1x11lor ii large extranei im~~lciiietit;itit,n ii CA opcratctl h y sn~iico~ic else, Iioth the CI’ and CI’S iirc
the easiest iiicthod is io use ti digital cxrtilicate (public required to ciisurc that Iiotli ccrtificxtcs arc considerecl
key infrastrllctliro). cqtial iii the rtrquircrl iisprcts.