To: blankmind who wrote (1024 ) 1/23/1998 7:22:00 PM From: Maverick Respond to of 1629
Secret agent WAN VPNs protect remote access on the Internet by turning data into shared secrets By Al Berg The Internet is a vast collection of computer networks linking almost every major--and not so major--business center on the planet, but companies have historically shunned it as a way to link offices. They've chosen more expensive dedicated networks because the Internet's performance has been capricious and its security unreliable. Although the Internet's unpredictable performance is still a barrier to using it as a WAN for many mission-critical applications, Virtual Private Networks (VPNs) take the fear out of sending sensitive corporate data over the Internet, a notoriously publicnetwork. In a VPN configuration, the clients and servers that compose the virtual network are connected to the Internet in the usual ways: with dial-up modems, ISDN lines, or dedicated access lines. Each node on this "network within a network" encrypts the data it sends to other virtual network locations. As the encrypted data traverses the Internet, eavesdroppers see a nonsensical data stream and cannot read the contents. Corporations are attracted to VPNs because accessing the Internet is significantly less expensive than using traditional dedicated access lines. In a study conducted by Intel Corp., a 128Kbps frame-relay link would cost the Hillsboro, Ore.-based company $3,168.75 per month as opposed to $888 per month for a link to the Internet. For this single site, a VPN would offer a cost savings of approximately $27,000 every year. VPNs can be used to link sites together or to enable mobile clients in the field, such as laptop-toting salespeople, to access the computers at headquarters from any location with a dial-up Internet connection. When two sites are linked in a VPN configuration, each site must have a VPN-aware router, firewall, or VPN access device installed. In the latter scenario, the road warrior's laptop is equipped with a piece of VPN client software that knows the addresses and associated encryption keys for the hosts back at the office. The VPN's encryption keys are shared by clients and servers. These "shared secrets" permit the computers on the VPN to encrypt data so that it can be read only by other members of the same virtual networks.