320 likes | 533 Views
Virtual Private Networks. An Economical Option for Broadband Connectivity. Virtual Private Networks. Darin Dugan dddugan@iastate.edu. Brian Webster bwebster@iastate.edu. Agenda. Current ISU Extension network Why do we need a Virtual Private Network? What is a Virtual Private Network?
E N D
Virtual Private Networks An Economical Option for Broadband Connectivity
Virtual Private Networks Darin Dugan dddugan@iastate.edu Brian Webster bwebster@iastate.edu
Agenda • Current ISU Extension network • Why do we need a Virtual Private Network? • What is a Virtual Private Network? • Types of VPNs, typical configurations • What ISU Extension has done • Lessons learned • Cost analysis • Conclusion
Current ISU Extension network • 107 county and area offices • Frame-relay • 56k links aggregated into 3 T1s • Bandwidth unchanged since 1994 • Local file storage and network printing managed centrally from ISU campus
Problems • Low speed • High cost
Solutions • Increase spending (funding) • Find alternative technologies
Increase spending • Increase state/federal appropriations • Pursue grants • Form strategic partnerships • Any way you cut it, this is a difficult thing to do
Alternative technologies • Broadband options are increasingly common • A connection to the Internet is probably less costly than a connection to your central site • How to manage effectively? • Virtual Private Networks
Why do we need a VPN? • Security • Remote management • Ability to “touch” workstations • Network identity • ISP service filtering and firewalls
What is a Virtual Private Network? • According to Webopedia.com: a network that is constructed by using public wires to connect nodes. For example … using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
What is a Virtual Private Network? • Uses a public network (the Internet) • Secured through encryption • Limited access • Logically acts like a traditional private network
Benefits • Connection-independent • Comparable equipment cost • Secure – all data encrypted • Extend the network to anywhere
Typical VPN tunnel • IPSec • 3DES encryption • Pre-shared keys • L2TP with IPSec • 3DES encryption • Digital certificates • Multi-protocol • PPTP • MPPE encryption
Two types of VPNs • Remote-user • Usually software-based • Workstation to central site • Best for roaming users • Remote-site • Connect sites to each other • Hardware- or software-based • Best for entire office
Typical frame-relay network Central Site (Campus) Internet physical and logical Remote Office (Field)
Typical Internet-connected network Central Site (Campus) Internet physical and logical Remote Office (Field)
Typical virtual private network Central Site (Campus) Internet logical physical Remote Office (Field)
Split-tunneling • Two logical networks • VPN tunnel to central site • Direct to Internet (not tunneled) • Reduces bandwidth used at central site • Allows Internet access when central site is down • Could introduce security risks – bypasses central site firewall, policies, etc
Split-tunneled VPN Central Site (Campus) Internet Remote Office (Field)
Equipment options • Software-based • Linux, BSD, Windows 2000, etc • Re/use commodity PC hardware • Might perform double-duty as fileserver, etc • Hardware-based • Dedicated system • “Black box” • Alcatel, Check Point, Cisco, Intel, Network Associates, SonicWALL, others
Hardware used • Cisco VPN devices • Familiar with Cisco brand • Most of ISU uses Cisco devices • State contract • Existing Cisco infrastructure
Hardware used – central site • Cisco VPN 3030 Concentrator • Hardware-based encryption • Up to 1500 simultaneous tunnels • Up to 50 Mbit encrypted throughput • Appliance-like functionality • Does not use Cisco IOS
Hardware used – remote sites • Cisco VPN 3002 Client • Hardware-based encryption • Up to 2 Mbit encrypted throughput • Appliance-like functionality • Does not use Cisco IOS • Two modes • Client mode – uses NAT to hide LAN • Network Extension Mode – LAN is fully routable
Real-world testing • Positive results • DSL, cable, wireless, dial-up • About 10% overhead • Two active pilots • DSL – over three months • Wireless – over four months • Negative results • Satellite
Lessons learned – VPN 3000 series • Easy to set up and configure • Reliability depends on service • Works well for both site-to-site and remote-user tunnels • Appliance-like functionality • Not as flexible as some other products • Does not properly support split-tunneling
Other Cisco hardware choices • 1710 or 1720 for remote sites • Most flexible • Uses Cisco IOS • Up to 4 Mbit encrypted throughput • 3600, 7100 or 7200 series for central site • Most flexible • Uses Cisco IOS • Multi-purpose
Cost Analysis • Frame-relay • 56 Kbit service • Line charges: $275k per year • Average $2570 per office per year • Average $214 per office per month • Remote site hardware: $1500 (each, approx.)
Cost Analysis • Virtual Private Network (actual example) • 768/512 Kbit DSL service • $99.95 per office per month • $1200 per office per year • 20 service locations • Remote site hardware: $900 (each, approx.)
Cost Analysis • Line cost savings: • $2570 - $1200 = $1370 per office per year • Hardware cost: • $1370 - $900 = $470 still saved! • Pays for itself within the first year • Bandwidth dramatically increased • After the first year, saves $25k+ per year
More information • VPN Concepts • http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/cw2000/vpnmon/1_x/1_0/using/vpnmcon.htm • Virtual Private Network Consortium • http://www.vpnc.org • Introduction to IPSec • http://www.cisco.com/warp/public/105/IPSECpart1.html • Various whitepapers • http://directory.google.com/Top/Computers/Security/Virtual_Private_Networks/Whitepapers/
Questions Darin Dugan dddugan@iastate.edu Brian Webster bwebster@iastate.edu