SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Ascend Communications (ASND)
ASND 222.15+2.2%Feb 6 9:30 AM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Bradley W. Price who wrote (41446)3/29/1998 8:38:00 AM
From: Glenn D. Rudolph  Read Replies (1) of 61433
 
Issues and Trends: Remote access servers

By Tim Greene
Network World, 3/23/98

While most network equipment vendors try to dazzle you with grandiose
claims of new cutting-edge features, remote access server providers remain
focused on the bread-and-butter basics. And well they should, because it's the
basics - authentication, encryption, compression, modularity, fault tolerance
and port density - that will serve you well when it comes to enterprise-level
remote access.

That said, there is one feature that's starting to stand out as a popular
accompaniment to those core functions: a virtual private network (VPN).
VPNs can save you big bucks on your long-distance telephone bills by using
the Internet to tie remote users to the corporate backbone. But VPNs add
something else too - network security vulnerabilities.

Look for an enterprise-class remote access server that enables VPNs and
sports ironclad security. These boxes also give you the flexibility of
maintaining direct dial-up ports for remote users who connect through a
local call or those who want to use a secure dedicated circuit.

Because many of you want the biggest and best remote access server vendors
have to offer, our Buyer's Guide Chart focuses on hardware-based products
with a minimum of 24 ports. After all, these are the boxes that have the most
differentiating features.

Stripped-down models can function as simple access concentrators with
modems and a LAN feed. But higher end products can be fitted with a
battery of security ranging from simple user name/password to secure token
support. Just under half of the remote access servers on the chart support
tunneling technology that encrypts IP packets and encapsulates them for
transport across IP networks.

In this initial phase of deployment, tunneling is best suited for remote access.
Remote users call their local Internet service provider, use the Internet for a
long-haul link, then reach the corporate site over a dedicated feed from the
ISP. Expected upgrades will improve management, making it easier to assign
limited access rights for extranets.

All but one product in the chart - Lantronix's LRS32F - are modular
chassis-based systems. Most of these devices support authentication,
authorization and encryption. Enhanced management interfaces make it
easier for administrators to establish and maintain VPNs.

For example, 3Com Corp. this spring is expected to release Web-based
management tools for its Total Control HiPer Access System/EdgeServer
Pro Module, part of the product line 3Com gained last year when it acquired
U.S. Robotics. The tools enable you to set up and manage security features
such as IP tunnels, controlling access based on time of day and session
length. 3Com will add tunneling support to the Total Control box this
spring.

Other vendors with current or planned support for some form of tunneling -
including Adtran, Inc., Ascend Communications, Inc., Bay Networks, Inc.,
Compaq Computer Corp. and RAScom, Inc. - claim their remote access
servers will support the Layer 2 Tunneling Protocol after the standard is set
sometime this year.

Virtually all vendors included in the chart support a battery of authentication
security mechanisms, including the Terminal Access Controller Access
Control System (TACACS), Challenge Handshake Authentication Protocol/
Password Authentication Protocol (CHAP/PAP), dialback and Remote
Authentication Dial-In User Service (RADIUS).

These security options range in sophistication. Dialback, for example, simply
identifies the phone number of an incoming call. The remote access server
only calls back authorized numbers to initiate a connection. A step up is
CHAP, in which the server issues a challenge - a unique code - to the calling
client. The client responds with a password that is encoded based on the
challenge it has received. In theory, only an authorized client will be able to
respond with a properly encoded response.

TACACS and RADIUS support com-munication between the remote access
server and a separate security server that performs authentication. In
addition, RADIUS provides call accounting and can define limits on
individual or group access rights. Some vendors even support Kerberos
server-to-server authentication.

Many of the advanced features of high-end remote access servers are
designed for service providers, but these features parlay into benefits for
corporate users, too. For example, voice-over-IP capabilities enable ISPs to
offer new voice services, but the tech-nology also represents a cost-saving
opportunity for the enterprise.

Some remote access servers can route voice calls to distant sites over an IP
network, including the Inter-net, obviating long-distance phone charges or
the need for separate voice trunks. Total Control, for example, already
supports IP voice, and vendors such as Ascend, Bay and Cisco have promised
support in upcoming models of their boxes.

Among the differences you'll find between enterprise-class servers and their
poorer cousins are redundant power supplies, hot-swappable cards and
support for ever-increasing port densities.

For example, Bay's Versalar 5000 Access Switch and Versalar 5399 Remote
Access Concentrator Module support dual channelized T-1 cards with 48
modems. The cards provide the building blocks for enormous capacity (see
review). Other vendors, such as start-up Aptis Communications, Inc.,
specialize in port density. Aptis' CVX 1800 crams 1,344 modems on a single
shelf.

At the same time, vendors are trying to keep the number of required
modems to a minimum. For example, Compaq's Microcom 6200
concentrator can direct calls to the desired network device via any available
route. If all direct modem connections to a particular LAN-based
asynchronous device are busy, Compaq's ADAPTive switching technology
sniffs out alternate routes and modems.

You'll find enhancements to some of the more traditional remote access
server features, too. Most of the pro- ducts featured in the chart had 56K
bit/sec modem support before the preliminary V.90 modem standard was set
in February. Modem vendors accept those specifications as the likely
standard and are readying soft- ware upgrades to make their devices
compliant.

What's more, most of the products included in the chart continue to support
ISDN via Primary Rate Inter- face trunks.3Com and Cabletron Systems,
Inc.'s products support digital subscriber lines (DSL). DSL enables dedicated
broadband access over regular phone lines to support power users who need
to move big files to and from remote offices or home. DSL is still maturing
and service availability is limited so far, but it's coming. Thanks to new
cards and software upgrades that can add functionality, today's remote access
servers stand to live long lives.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext