The following text is copyright 1998 by Network World, permission is hearby given for reproduction, as long as attribution is given and this notice is included.
Security on the horizon
By Scott Bradner
Network World, 5/18/98
A s predicted in a front-page story in the May 4th issue of Network
World, virtual private networks (VPN) were all the rage at
NetWorld+Interop 98 in Las Vegas. VPNs were not the only hot topic
by far, but they did seem to be everywhere you looked.
The show seemed a bit subdued compared with last year's (although
any show in Las Vegas is on an entirely different plane than shows
elsewhere). The magicians trying to entice you to listen to a spiel
about Ethernet switches were here once again, but there seemed to be
fewer of them and, wonder of wonders, there were even some
technically competent people in some of the booths.
In addition to VPNs, the Gigabit Ethernet vendors were out in force
with 20 or more booths in addition to the big Gigabit Alliance booth.
There were many other interesting products, such as Manage.Com's
Java-based front-line management station.
But VPNs seemed to me to be the show focus this year, just like
Gigabit Ethernet was last year, IP Switching the year before and ATM
before that. I just hope Gigabit Ethernet and VPNs do not take the
same path to success that the other hot topics did.
One problem with all of the attention on VPNs is there is no one
consistent thing that the VPN proponents are talking about.
Some vendors are talking about the connections between corporate
firewalls when they speak of VPNs. Others are referring to the
connections inside a WAN that an ISP might set up to do traffic
engineering or to help facilitate the delivery of consistent quality of
service (QoS). Others mean the IP tunnels that can be created between
an on-the-road employee dialing into a local ISP and the home office.
And a few vendors seem to think any en-crypted point-to-point link
qualifies as a VPN.
All of the above are valid definitions of what a VPN might be. But
with all of the differing assumptions about VPNs, it is a good idea for
users considering the purchase of VPN services or equipment to be
sure that their own and the vendors' assumptions about the
technology are in line.
One thing that most definitions of the technology have in common is
that a VPN includes encrypted point-to-point tunnels. Encouragingly,
most of the vendors I saw said they supported IP Security. IPSec is
the IETF technology that supports encrypted tunnels along with
management of the cryptographic keys. IPSec is in the final stages of
being approved as a proposed standard.
In spite of the fact that IPSec is not yet approved, eight IPSec
software vendors have already demonstrated interoperability between
their products, and many more companies have announced products.
It's a good sign that most of the VPN vendors say they already
support IPSec or will in the future. This means there is a reasonable
chance that many of the VPN products will interoperate. This, of
course, is the purpose of standards.
Disclaimer: Even though Harvard sets its own standards, its
products interoperate. The above are my own observations.