To: blankmind who wrote (1022 ) 1/23/1998 7:25:00 PM From: Maverick Respond to of 1629
Secrete WAN, Part II Several encryption schemes are used by VPN vendors. Leading the industry are Layer 2 Tunneling Protocol (L2TP) from Microsoft Corp. [joint dev. w/ ASND} and Cisco Systems Inc. and IPSec (IP Security), a standard being developed by the IETF (Internet Engineering Task Force). In each scheme, keys need to be distributed to remote clients and sites to permit interoperability. However, secure-key distribution poses two problems for the VPN administrator: keeping your keys out of the hands of an eavesdropper and making the key exchange process transparent to users. The Internet Security Association and Key Management Protocol (ISAKMP) may resolve these problems. ISAKMP is a draft standard, and you can find the text at hegel.ittc.ukans.edu . ISAKMP exchanges the key information between two nodes on a VPN by establishing a secure, encrypted connection between the nodes and exchanging the key information for the VPN connection. However, this specification does not address how the two nodes will select their encryption keys. The IETF's IPSec working group is developing another standard, the OAKLEY Key Determination Protocol, which "describes a protocol by which two authenticated parties can agree on secure and secret keying material." Encrypting and decrypting data flowing over the VPN is a very CPU-intensive task. As data arrives at a VPN node, it must check that the data came from another node on the virtual network. If it did, the receiving node (router, firewall, or dedicated VPN unit) must decrypt the data before passing it on to its destination on the local network. The equipment at the end points of the VPN connection (routers, firewalls, or dedicated VPN units) can take several forms.You can install routers with built-in VPN capabilities, such as those provided by Ascend Communications Inc. (http://www.ascend.com), Bay Networks Inc. (http://www.baynetworks.com ), Cisco (http://www.cisco.com), and 3Com Corp. (http://www.3com.com). End points can be computer-based firewalls with built-in VPN capabilities, such as Raptor Systems Inc.'s Eagle products (http://www.raptor.com) and Check Point Software Technologies Ltd.'s