Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: VPNs

Related Topics

In the News (Thu 18 Jul 19)

  Virtual private network - Wikipedia, the free encyclopedia
VPN is a cost effective and secure way for different corporations to provide user access to the corporate network and for remote networks to communicate with each other across the Internet.
Secure VPN are more cost-effective than dedicated private lines; usually VPN involves two parts: the protected or "inside" network, which provides physical and administrative security to protect the transmission; and a less trustworthy, "outside" network or segment (usually through the Internet).
From the user's perspective, this means that while the VPN client is active, all access outside their employer's secure network must pass through the same firewall as would be the case while physically connected to the office ethernet.
en.wikipedia.org /wiki/VPN   (1572 words)

 Riverstone Networks - MPLS VPNs - Layer 2 or Layer 3?
In a Layer 2 MPLS VPN, the PE router is not a peer to the CE router and does not maintain separate routing tables.
VPN traffic is carried over an IP/MPLS network, without upgrading to expensive and specialized core routers at the edge.
In the end, as MPLS VPNs are deployed, it is likely that carriers will choose Layer 2 and Layer 3 VPNs for many of the same reasons they decided to deploy Layer 2 or Layer 3 networks.
www.riverstonenet.com /solutions/mpls_vpns_layer2_or_layer3.shtml   (1805 words)

 Greg Mikos
VPNs are corporate extranets where a company's office, suppliers, and customers communicate via the public internet.
Network Alchemy has developed technologies that enabled VPNs to address the concerns of reliability, security, and scalability that have stalled VPN development.
Frost and Sullivan, a research consultancy, predicts that the U.S. VPN market was worth $3.5 billion in 1998 and will grow to $18.7 billion by 2004.
www.auburn.edu /~boultwr/Mikos_VPNs.htm   (424 words)

 [No title]
The VPN Model of this document appears to be an instance of the framework described in [4].
VPNs with Different Routes to the Same System Although a site may be in multiple VPNs, it is not necessarily the case that the route to a given system at that site should be the same in all the VPNs.
A "transit VPN" is one which contains a router that receives routes from a "third party" (i.e., from a router which is not in the VPN, but is not a PE router), and that redistributes those routes to a PE router.
www.ietf.org /rfc/rfc2547.txt   (8477 words)

 Using VPNs
VPNs are based on a concept called tunneling, a method of encapsulating data into encrypted packets that can travel over IP networks securely and be delivered to a specific address.
The VPN was created prior to the availability of cable or DSL Internet access as a means to establish an on-demand private network between a network server and a dial-in remote user.
The costs associated with implementing a VPN must be justified against the current operational expenses incurred with the support of remote offices and users.
beradio.com /mag/radio_using_vpns/index.html   (1090 words)

 Riverstone Networks - Metro Solutions: Carrier VPNs
IPSEC VPNs are typically used for remote access for telecommuters and mobile workers.
The move from Layer 1 to Layer 3 VPNs is seen as a normal technological progression as the world standardizes on IP as the network application protocol.
We call this VPN Continuity and the key to providing it is L2 MPLS, and, in particular, the recent Martini drafts.
www.riverstonenet.com /solutions/carrier_vpns.shtml   (2755 words)

 Solutions Applications MPLS IP VPNs
MPLS IP VPNs continue to grow in popularity, with telecommunications research firm Infonetics projecting a 283% increase in deployments between 2002 and 2006.
The ST200 is the first MPLS IP VPN implementation with the high capacity and density, security and service management required by carriers to cost-effectively and rapidly provision, manage and bill for IP VPN services.
VPN statistics are then delivered to billing and SLA management applications, or viewed directly via the LPS.
dnd.ecitele.com /solutions/mplsvpns.html   (1278 words)

 IP VPNs: What’s Killing the Killer App?
Once the CPE for a VPN is in place, providing encryption from the moment the data leaves the building, managing that equipment requires only a small portion of one network administrator's time.
Even in intra-company VPNs today, a call from a European office to the U.S. might mean several network provider handoffs, first from a local to a regional carrier, then to a long-haul carrier and back to a local provider on the other end.
With many buzzwords like "VPN," "convergence" and "next-generation," we can easily fall into the trap of talking about technology for technology's sake and forget that all the carriers and their customers really want are solutions to business problems.
telephonyonline.com /news/telecom_ip_vpns_whats/index.html   (1606 words)

 VPNs unlock access mysteries
For business users, however, the versatility of VPNs and their ability to handle diverse types of traffic promises the technology will provide an economical method of moving data from place to place in ways that would have been prohibitively expensive over leased lines.
However, for up-and-coming VPN providers, "the sweet spot is outsourcing and delivering value-added services to the customer," says Nick Magliato, vice president and general manager of the network solution group at Digex, a Beltsville, Md.
This dramatically segmented market means that VPN providers must understand their customers-and their own businesses-if they hope to make a go of it.
telephonyonline.com /mag/telecom_vpns_unlock_access/index.html   (2340 words)

 Review: SSL VPNs - News by InformationWeek   (Site not responding. Last check: 2007-10-12)
Coincidentally (or not), the SSL VPN market has exploded in the past three years, with Frost and Sullivan forecasting continued growth at an annual rate of 49 percent through 2010 with sales exceeding $2.46 billion.
IPsec VPNs are the ideal solution for long-term, static connections between remote sites and are a manageable way to grant small user populations secure remote access.
Say a user doesn't have a virus scanner installed; with granular control he or she may not be allowed to upload files to a file server--that adds an additional layer of protection to internal resources.
www.informationweek.com /story/showArticle.jhtml?articleID=166404268   (1679 words)

 VPNs proving vital to corporate nets
VPN products are now fairly stable and can communicate relatively well with one another using the defined standard, but their evolution toward interoperability and manageability is far from complete.
For example, you could set up a CheckPoint VPN for remote access and site-to-site connections to branch offices and a Cisco PIX VPN for a partner extranet, and you could control all of the devices and clients involved from one location.
VPNs are quickly becoming a standard component in the IT infrastructure.
www.infoworld.com /articles/tc/xml/01/11/19/011119tcvpn.html   (1376 words)

 VPNs - Webled.com
[ routing instances for Layer 2 VPNs 1 routing instances for VPNs ]...
[ VPNs and VPLS 1 I. independent-domain statement Layer 3 VPNs 1 ]...
[ Layer 2 VPNs 1 VPLS 1, 2 VPNs 1 interface-mac-limit statement ]...
www.webled.com /VPNs.htm   (532 words)

 VARBusiness | The Promise of VPNs   (Site not responding. Last check: 2007-10-12)
Despite its complexity, the notion behind a VPN is simple: to ensure no one can eavesdrop on or intercept your client's information when it is en route between offices, traversing the otherwise-public Internet.
A third option is to use VPN software to enable specific PCs to connect to a VPN appliance, router or firewall maintained at the headquarters.
VPN hosting providers can set up a secure network across the Internet, connecting several locations and mixing networks and isolated PCs together.
www.varbusiness.com /sections/research/research.jhtml?ArticleID=36857   (1360 words)

 O'Reilly -- Safari Books Online - 1587051796 - Comparing, Designing, and Deploying VPNs
However, with so many flavors of VPNs available, companies and providers are often hard pressed to identify, design, and deploy the VPN solutions that are most appropriate for their particular network architecture and service needs.Comparing, Designing, and Deploying VPNs brings together the most popular VPN technologies for convenient reference.
Virtual private networks (VPNs) enable organizations to connect offices or other sites over the Internet or a service provider network and allow mobile or home-based users to enjoy the same level of productivity as those who are in the same physical location as the central network.
However, with so many flavors of VPNs available, companies and providers are often hard pressed to identify, design, and deploy the VPN solutions that are most appropriate for their particular network architecture and service needs.
safari.oreilly.com /1587051796   (1445 words)

 IEC: Virtual Private Networks (VPNs)
While VPNs offer direct cost savings over other communications methods (such as leased lines and long-distance calls), they can also offer other advantages, including indirect cost savings as a result of reduced training requirements and equipment, increased flexibility, and scalability.
In a VPN, not only can T1 or T3 lines be used between the main office and the ISP, but many other media can be used to connect smaller offices and mobile workers to the ISP and, therefore, to the VPN without installing any added equipment at headquarters.
Outsourcing the VPN to a service provider can also reduce your internal technical-support requirements, because the service providers take over many of the support tasks for the network.
www.iec.org /online/tutorials/vpn/topic02.html   (470 words)

Once VPNS is setup please click here to be directed to instructions on setting up email from home.
When you enter your username and password and click on connect, the Microsoft VPN client establishes a connection the one of the campus VPN servers, which places your connection in a quarantine status until VPNGuard reports that your system meets campus security requirements.
VPN services are available intermittently during these times.
www.fullerton.edu /IT/Services/Email_Remote_Access/faq/vpn.asp   (1250 words)

 Amazon.com: VPNs Illustrated: Tunnels, VPNs, and IPsec: Books: Jon C. Snader   (Site not responding. Last check: 2007-10-12)
Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs function by observing their behavior "on the wire." By learning to read and interpret various network traces, such as those produced by tcpdump, readers will be able to better understand and troubleshoot VPN and network behavior.
VPNs Illustrated is rich in diagrams, including packet headers and state diagrams, examples of network traffic, and cartoons that explain the architecture of the system, or network.
Given the complexity of VPN I was hoping to find a book that could explain key technologies in a concise and an organized manner.
www.amazon.com /VPNs-Illustrated-Tunnels-IPsec/dp/032124544X   (2290 words)

 Dave Piscitello's Personal Journal
I don't doubt that a badly configured VPN is insecure and that statistics can claim how many are probably insecure, but I do think that the focus is incorrectly directed at the VPN technology and not at the users/admins/consultants/whoever.
The term SSL VPN was adopted in the late 1990s by vendors who needed to distinguish secure access by the authenticating and encrypting protocol they used.
SSL VPNs are simpler to deploy, and demonstrably less expensive to implement and operate.
hhi.corecom.com /catVPNs.htm   (3143 words)

 InformationWeek.com   (Site not responding. Last check: 2007-10-12)
In addition, some of the most ubiquitous global VPN service providers, including Equant and Infonet, primarily own nodes and switches in hundreds of countries and territories and base their business on managing that giant network.
The new global VPN services offer a choice of data-carrying technologies while touting the IP-over-Internet structure, which emerged a few years ago as a more flexible and economical alternative to circuit-based VPNs (which in turn are a much more economical alternative to private leased lines).
Although the VPN services market is still relatively small, many analysts, including Todd Miller of the Yankee Group, say it's going to take off over the next five years.
informationweek.com /801/global.htm   (1060 words)

 VPNs Made Easy
"Originally, the thinking around SSL VPN was to give every application a Web front end, but now you can just put in a gateway at the edge of the network," says Lisa Phifer, vice president of Core Competence Inc., a consulting firm in Philadelphia.
Some functions may be embedded in SSL VPN appliances and associated client software, or a separate proxy server may be required.
The SSL VPN market continues to expand as vendors rush into the space, but the future of many of them is questionable, analysts say.
www.computerworld.com /printthis/2003/0,4814,80659,00.html   (1332 words)

 Browser security takes off in VPNs | Tech News on ZDNet
Network managers point to SSL as a significant step forward in VPN ease-of-use that is quickly gaining market share as an alternative to the popular but less flexible Internet Protocol security (IPSec)--a trend that in turn is fueling new demand among companies and employees for remote network access.
He said that the SSL VPNs are so easy to use, the company's support issues disappeared literally overnight when they started using SSL VPNs.
Because a SSL VPN allows people to enter corporate networks via any Web browser, companies need to make sure that it has strong authentication to verify that its users are authorized.
news.zdnet.com /2100-1009_22-5140548.html   (1884 words)

 Analyst Corner - SSL VPN: IPSec Killers or Overkill? - Analyst Corner - CIO
SSL VPNs have been available for several years, but the market for SSL VPN appliances has been set on fire in the last 18 months by a new generation of low-cost purpose-built appliances, lead by competitors such as Neoteris, Nortel, and Aventail.
Network layer SSL VPN vendors are confusing and misleading customers with their attempts to position network layer SSL VPNs as the best of both virtual private network worlds.
SSL VPNs are emerging as a viable alternative to full blown VPNs, and are particularly suited to mobile workers and extranet applications where secure, controlled access to a specific set of applications is required.
www2.cio.com /analyst/report1816.html   (1960 words)

 NWC | Column | The Next Revolution in VPNs | | August 5, 2002
Now, with new network-based VPN services, our definition is about to change again -- but the real impact of network-based VPNs is not entirely related to the technology.
It's easy to see why Internet VPNs are popular: They are applicable to a wide range of problems and extend the reach of network services beyond conventional services.
But though Internet VPNs are very successful in those network domains, they have not displaced traditional WAN services for LAN-to-LAN connectivity.
www.networkcomputing.com /1316/1316colwillis.html   (751 words)

 VPNs and VPN Technologies > Overview of VPNs and VPN Technologies   (Site not responding. Last check: 2007-10-12)
A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure such as the Internet.
VPNs maintain the same security and management policies as a private network.
Intranet VPNs differ from extranet VPNs in that they allow access only to the enterprise customer's employees.
www.ciscopress.com /articles/article.asp?p=24833   (444 words)

Try your search on: Qwika (all wikis)

  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.