Datamation content and product recommendations are
editorially independent. We may make money when you click on links
to our partners.
Learn More
Two years ago, there seemed to be as many definitions of Virtual Private Networks as there were vendors.
Some vendors concentrated on hardware devices that provided a gateway and established communications channels across a public network. These devices included router capabilities and firewall security. Other vendors offered software solutions that ran on the server and the client workstation. In addition, several resellers and manufacturers bundled software and hardware to create a VPN. Others simply provided components, tools and utilities.
While the VPN market has stabilized with standards and products, traditional VPN service, based on ATM or Frame Relay, has given way to Internet Protocol (IP) and the Internet. IP-VPNs will be the central enabler of the new millennium economy, characterized by integrated global enterprises, electronic commerce, and just-in-time production, according to Cahners In-Stat Group.
IP-VPNs are taking market share away from traditional VPN services because of “lower costs, faster provisioning of service, improved security and greater ubiquity of service,” said Henry Goldberg, senior analyst with In-Stat’s Voice and Data Communications Service. According to a survey of VPN users, three-quarters of large U.S. organizations have either implemented an IP-VPN or plan to implement one within the next two years.
Managers have two options for implementing an IP-VPN: in-house, or as an outsourced service.
Goldberg said, “The vast majority of end-users currently implement in-house IP-VPNs, and there is no indication that this will change significantly for those planning future IP-VPNs. Outsourced IP-VPN service providers will have to do a much better job of marketing the advantages of outsourced IP-VPN service in order to gain market share.”
The In-Stat Survey also found:
- Large organizations with in-house IP-VPNs will spend roughly and average of $200,000 per year on customer equipment.
- Cisco is the preferred vendor for customer premise IPSec equipment.
- Large organizations with an outsourced IP-VPN service will spend over $500,000 per year on average for their outsourced service.
In researching VPNs, you may come across the following keywords describing product offerings, so we’ve provided brief definitions. In addition, because the VPN product market is crowded, we’ve provided a glimpse of products available to network managers for implementing in-house VPNs or managing their current implementations, as well as a link for additional information from the vendors.
- PPTP — Point-to-Point Tunneling Protocol, developed by Microsoft and U.S. Robotics, provides a secure connections using the Layer 2 of the OSI model. It uses existing PPP technology, provides flow control, and safeguards the data using Microsoft Point-to-Point Encryption. It requires Microsoft NT servers to operate.
- L2F — Layer 2 Forwarding supports VPN connections by taking data and forwarding it to the proper destination. In a sense, these devices work like bridges across a switched network.
- L2TP — Layer 2 Tunneling Protocol combines the features of PPTP and L2F. The protocol runs on frame relay and ATM links as well as switched networks and supports authentication to verify that the sender is permitted to access and transmit data. It does not encrypt transmissions, but it will work in conjunction with IPSec.
- IPSec compliant — These products provide encryption facilities for data transmissions. They only work with the Internet Protocol and can either encrypt the entire IP packet or only encrypt the data. The latter approach then uses the original IP address to establish the tunnel and transport the encrypted data. IPSec products operate at Layer 3 of the OSI model.
- Remote clients — These products allow users who are not physically at the site of a network to establish a Private Virtual connection between their workstation and the remote server.
- Non-IP protocols — Many VPN products use IP protocols to create the tunnel for data transmissions. A few, however, can implement other protocols, and this may be needed for some installations.
- Key management software — Key management software allows communications managers to control the distribution of encryption keys.
- Hardware certificate authorization — These devices send a certificate that identifies the sending and receiving systems. Once the devices validate the certificate, they establish a tunnel and transmit the data.
Vendor: Avaya Communications
Product: VPNmanager Series
NOS: Windows 2000, NT, Solaris
www1.avaya.com/enterprise/who/docs/vpnmanager/
Vendor: CheckPoint Software
Product: VPN-1 Product Family
NOS: Windows 2000, NT, Solaris, RedHat Linux, HP-UX, IBM-AIX
www.checkpoint.com/products/vpn1/index.html
Vendor: Cisco Systems
Product: Cisco VPN Clients
NOS: Windows 95, 98, 2000, ME, NT
www.cisco.com/warp/public/cc/pd/vpnc/vpncl/
Vendor: Fortress Technologies
Product: NetFortress M-Series
NOS: Windows 95, 98, 2000, NT
www.fortresstech.com
Vendor: Lucent Technologies
Product: VPN Firewall Family
www.lucent.com/products/solution
Vendor: Nortel Networks
Product: Contivity VPN Switches
NOS: Windows 95, 98, 2000, NT
www.nortelnetworks.com/products/01/contivity/fandb.html
Vendor: PGP Security
Product: Gauntlet Firewall and VPN
NOS: Windows, NT, Solaris, HP-UX
www.pgp.com/products/gauntlet/default.asp
Vendor: RedCreek Communications
Product: 3VPN Client Manager
NOS: Windows 98, 2000, ME, NT
www.redcreek.com/products/3VPN.html
Vendor: Symantec Corporation
Product: Symantec Enterprise VPN
NOS: Windows 2000, NT, Solaris
enterprisesecurity.symantec.com/products/
Vendor: V-One Corporation
Product: SmartGate
NOS: Windows 2000, NT, Solaris, RedHat Linux
www.v-one.com/products/smartgate.html
Danya Delmonico writes for CrossNodes, an internet.com site where this story first appeared. For more detailed information on VPNs, click here.
-
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
-
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
-
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
-
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
-
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
-
Top 10 AIOps Companies
FEATURE | By Samuel Greengard,
November 05, 2020
-
What is Text Analysis?
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
-
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
-
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
-
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
-
Top 10 Chatbot Platforms
FEATURE | By Cynthia Harvey,
October 07, 2020
-
Finding a Career Path in AI
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
-
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
-
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
-
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
-
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
-
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
-
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
-
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
-
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
SEE ALL
ARTICLES