Understanding VPN technologies and capabilities

Virtual Private Networks (VPNs) are the mainstay of the mobile environment. Enterprises across the world are looking for and finding a multitude of ways to provide the remote, mobile end user with secure access to corporate computing facilities and mission-critical applications. VPN technologies allow organizations to build remote-access capabilities for at-home workers, global travelers, guests, partners, contractors and many other varieties of end-user profiles.

For the longest time, VPN merely meant access for site-to-site connectivity over a provider's backbone that was shared with other customers (e.g., the traditional ATM/Frame WAN backbones). Yes, those old legacy WAN networks were VPNs. The latest and greatest today is the

    Requires Free Membership to View

Multiprotocol Label Switching (MPLS) VPN for site-to-site VPN connectivity over an IP-enabled, QoS-capable WAN that can support real-time applications such as voice and video. These applications, along with data, can now be delivered via site-to-site MPLS VPNs.

As I mentioned above, however, mobility is the key -- and today's VPN focus is on end-user access through remote-access VPNs. A great deal of Tunneling" is just a phrase to indicate that there is a virtual connection between the end user's device and the customer premises where the applications reside.

More on this topic

VPN All-in-One Guide

SSL or IPsec VPNs: Considerations for comparison

Webcast: Four Steps to True End-to-End Service for MPLS IP VPNs

IPsec has been the dominant protocol for providing secure remote-access services. The topology of IPsec architecture consists of tunnel termination platforms (router or server) and agents loaded onto remote devices. This was deemed a bring-your-own Internet service, because as long as you had Internet access and could reach the VPN server, you were hooked up to the corporate network. There are tons of vendors who support IPsec remote-access products and technologies (Cisco, Juniper, Microsoft and a host of others). These solutions are well known and work well, but the need to deploy a software agent onto the end-user device limited the types of access available.

With IPsec, end users had to have a company laptop or PDA in order to access the corporate network. The requirement for clientless access is pushing remote-access services built on Secure Sockets Layer (SSL) technologies that utilize Web interfaces such as Internet Explorer to provide the same capabilities (secure, remote access) as an IPsec VPN without the hassles of an agent -- or a laptop, for that matter. This allows remote users to gain access to corporate applications (with email being a major application) from any device that supports a Web browser. This allows folks to communicate even when they do not have their VPN-enabled laptops. Email, order status, order entry and many other functions can be accomplished from almost anywhere.

IPsec and SSL VPN primarily provide the same function: secure, remote access. The capabilities of each differ primarily in how the access is facilitated.

About the author:
Robbie Harrell (CCIE#3873) is the National Practice Lead for Advanced Infrastructure Solutions for SBC Communications. He has more than 10 years of experience providing strategic, business and technical consulting services. Robbie lives in Atlanta and is a graduate of Clemson University. His background includes positions as a principal architect at International Network Services, Lucent, Frontway and Callisma.

This was first published in July 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.