enabling secure virtual private networks
TRANSCRIPT
-
8/8/2019 Enabling Secure Virtual Private Networks
1/12
Enabling Secure
Virtual Private NetworksOver the Internet
-
8/8/2019 Enabling Secure Virtual Private Networks
2/12
2
E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t
Contents
Introduction 3
The Promise of Internet-Based Networking 3
sMigration of technologies onto a common infrastructure
sCurrent and future applications migration
The Importance of Internet Virtual Private Networking 4
sTremendous cost savings
sOutsourcing of equipment and management
s Integration of applications onto acommon platform and infrastructure
sVPNs an excellent WAN solution today
Security over the Internet 5
sStrong security with Intel Express Routers
Internet VPNs with Intel Express Routers 6
sSetting up links to ISPs
sEasy transmission via any ISP
sTunneling LAN protocols and filtering
Alternative Solutions 7
sRouter vendors
sApplication software developers and operating systems
sFirewall or dedicated devices
The Future of VPNs 9
sQuality of Service (QoS)
sBandwidth
Conclusion 10
-
8/8/2019 Enabling Secure Virtual Private Networks
3/12
E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t
3
Introduction
As a leading vendor of networking
products, Intel Corporation is committed
to making the network infrastructure
better suited for the applications that
businesses depend on.The Internet iskey to this endeavor. Since the emergence
of multimedia, the Internet has had an
unprecedented impact on PCs, appli-
cations and networking. It now offers
enormous opportunities for improvements
in interoperability and cost savings for
wide area data communications.
This paper describes the forces that
are influencing the industry migration to
Internet-based networking and discusseshow businesses can realize the promise
of the Internet by using Intel Express
Routers and tunneling to create
Virtual Private Networks (VPNs).
VPN technology opens doors that
may not have been available to
companies before, offering increased
security and reduced costs for
Wide Area Networking (WAN).
Intel Express Routers provide one
of the simplest and most secure VPN
solutions available today. They require
no additional hardware or software and
no changes to the corporate infrastructure
or network applications.LAN-to-LAN
communications travel securely over the
Internet, as easily as standard Internet
traffic, using virtually any Internet
Service Provider.
The Promise ofInternet-BasedNetworking
Since the advent of the graphical Web
browser, computer users throughoutthe world have been able to access
ever-increasing volumes of remote
information with unprecedented
ease and sophistication. The resulting
explosion in the popularity of the
Internet has helped to create a common,
standards-based infrastructure for global
digital communications. This, in turn,
has launched a spiral of visionary
promises the fulfillment of which has
changed computing for the better.
Affordable wide area networking
has been one of the Internets key areas
of promise. By taking advantage of the
Internet as a common networking envi-ronment, companies can dramatically
reduce the costs of connecting their
business sites and teleworkers. This
savings occurs because the cost of the
high-bandwidth Internet infrastructure
is shared among the many companies
that use it, somewhat like a large,
cooperatively owned WAN.
Migration of technologies ontoa common infrastructure
The clear advantages of globally inter-
operable email and immediate access
to worldwide information have quickly
consolidated the Internets position as a
vital business tool. Many companies in
the computer industry already assume
that customers have Internet connectivity
and use the ubiquitous TCP/IP networking
protocol. Thus, the Internet and its
standard protocols have become a
common denominator for networking
applications. This common platform has
several advantages over the traditional
model (Figure 1).
Current and future
applications migration
Many applications and even whole
categories of applications are nowmigrating to the Internet as the common
platform. For example, email systems
are shifting from proprietary messaging
protocols to support Internet-standard
protocols such as SMTP, POP3 and
IMAP. Other examples exist in virtually
every area of networking applications
(Figure 2).
The Internet as an
Applications Platform
s Standards-based applications
s Common security architecture
s Shared/multipurpose components
s Shared WAN connections
Figure 1
Traditional, Proprietary
Applications Platform
s Proprietary hardware and software
s Proprietary security models
s Disparate components
s Multiple WAN connections
Internet-Based Applications
s Internet VPN
s Remote access VPN
s World Wide Web
s Internet email
s Internet fax
s H.323 Internet phone
s H.323 Internet video phone
Figure 2
Todays Applications
s LAN-to-LAN connectivity
s Remote LAN access
s Corporate BBS, public notes, etc.
s Corporate email
s Fax, network fax
s Voice telephony
s Videoconferencing
-
8/8/2019 Enabling Secure Virtual Private Networks
4/12
The Importanceof Internet VirtualPrivate Networking
Two key steps allow a company to take
maximum advantage of the Internet for
business communications. The first stepis to establish Internet access. The second
is to take advantage of the Internet for
networking multiple business sites.
Internet Virtual Private Networking
(VPN) can help businesses take these
key steps, providing secure LAN-to-LAN
networking at a fraction of the cost of
traditional long distance connections.
Until now, this technology has generateda great deal of talk but few actual solu-
tions that businesses can use.
Intels line of Express Routers enable
multi-site businesses to realize immediate
and tangible benefits from VPN tech-
nology. They enable secure tunneling
over any supported WAN or Internet
link, so businesses can safely and easilyset up private LAN-to-LAN routing
over the public Internet.
Tremendous cost savings
For companies that now use private
WANs, the dramatic cost savings provided
by VPNs fully justifies the current excite-
ment about this new technology. For many
other companies, the affordability of
VPN technology offers a way to reapthe benefits of wide area networking
for the first time.
A simple cost comparison illustrates
the magnitude of the potential savings
using Internet VPNs as opposed to
traditional dedicated lines (Figure 3).
As with any service, the opportunity
for savings varies with the particularcircumstances of each company. In
general, the greatest cost savings arise
when dedicated connections to distant
sites are replaced with local Internet
connections for each site. The dedicated
WAN connections from each site to the
Internet Service Providers (ISPs) point
of presence (POP) are cheaper because
WAN services are typically priced basedon distance as well as bandwidth.
E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t
4
Figure 3
Typical monthly costs for traditional private WAN connections versus Internet access
Explanation of Charges
sISDNhas a low monthly rate, but charges 1 to 2 cents per minute plus additional long distance rates. For example:
GTE in Hillsboro, Oregon, charges $94 for installation and $48 per month for business, plus 1 to 2 cents per minute
depending on distance and time of day for a local call. Long distance calls for business-to-business connections costthe same as telephone long distance x 2 for 2 B channels (128Kbps).
So charges for 9 hours/day, 5 days/week are: $48 + (9 hours x 60 = 540 minutes x 20 days = 10800 x $.02 = $216) =
$264/month. Add long distance at 15 cents/minute = $1,620 + $264 = $1,884/month to connect two offices at 64Kbps.
$3,504 for 128Kbps.
Charges for 24 hours/day, 7 days/week are: $48 + (24 hours x 60 = 1440 minutes x 30 days = 43,200 minutes x$0.02 = $864) = $912/month. Add long distance at 15 cents/minute = $6,480 + $912 = $6,571/month to connect two
offices at 64Kbps. $14,054 for 128Kbps.
sInternet Access charges are also based on charges quoted in Hillsboro, Oregon. They include $123/month for a full
time Frame Relay connection plus an Internet access fee of $550/month from an independent ISP or $765/monthfrom GTE, the local Telco.
Prices shown are as of 7/97, valid only in the United States, and quoted in U.S. dollars. Although we make every effort to ensure that this information is accurate,
Intel assumes no responsibility for errors of fact or omissions herein. This information is subject to change without notice.
PRIVATE WAN CONNECTIONS INTERNET ACCESS
ISDN ISDN Frame Relay (VPN)
Bandwidth 9 hours/day 24 hours/day 24 hours/day 24 hours/day5 days/week 7 days/week 7 days/week 7 days/week
64Kbps $1,884 $6,571 $1,276.50
128Kbps $3,504 $14,054 $3,168.75$673-$888 per link
-
8/8/2019 Enabling Secure Virtual Private Networks
5/12
E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t
5
Outsourcing of equipment
and management
For many companies, lower WAN service
charges are only the most obvious benefit
of establishing Internet VPNs. They
can also save from less complex WANmanagement. In fact, using the Internet
for LAN-to-LAN connectivity is a highly
cost-effective means of outsourcing
expensive WAN equipment and complex
WAN link management. Most ISPs offer
services that include the management
of the WAN connection between the
company and the ISPs POP. The ISP
typically manages all the other connec-
tions upstream from that point. So
as a companys bandwidth needs grow,
its only points of concern are the indi-
vidual links between its sites and the
ISP POPs. The ISP is responsible for
meeting scalability requirements, and
also for upgrading or reconfiguring
upstream equipment to take advantage
of new developments in networking
technology.
Integration of applications onto a
common platform and infrastructure
Cost savings can also be realized by
consolidating applications onto the
common Internet-based networking
infrastructure. For example, rather than
needing one ISP connection for Internet
email and another ISP connection for a
private WAN link, a single connection can
be used for both. In the future, the same
Internet connection and VPN could also
be used to provide mobile employees
and teleworkers with secure remote LAN
access, eliminating the need for dedicated
remote access servers with numerous
modems and analog phone lines. A few
more years down the road, voice tele-
phony and videoconferencing services
(which today require a separate network)are likely to make the transition into data
network services and ultimately integrate
with Internet VPN services.
VPNs an excellent WAN
solution today
For many businesses, the speed and
quality of Internet services are more
than adequate to meet their WAN
communication needs especiallyconsidering the potential cost savings.
Current limitations for business use
of the Internet apply primarily to high-
bandwidth, time-sensitive transmissions,
such as audio, video and real-time data
bases. Even for companies employing
such applications, it may be highly
beneficial to establish Internet VPNs
for their less demanding applications.
(For more information on quality
of service and bandwidth issues, see
The Future of VPNs at the end of
this paper.)
Security overthe Internet
For many businesses considering the
Internet as their WAN communications
medium, a lingering concern is security.
They need to know that their private
networks are not at risk from unautho-
rized users and that their private business
data is secure as it crosses the public
infrastructure. Although this is a reason-
able concern given the vast size and open
accessibility of the Internet, current
technology offers appropriate security
for most businesses.
The most important considerationfor Internet security are:
sAuthentication Verifying that the
parties on the other end are who they
claim to be
sPrivacy Ensuring that transmitted
content isnt read or intercepted by
unauthorized recipients
sIntegrity Verifying that transmitted
data is received unchanged
Many solutions offer security
technology to make Internet VPNs
a viable option today. (These solutions
are discussed later in this paper in the
section titled Alternative Solutions.)
Strong security with
Intel Express Routers
Intel Express Routers offer powerfulsecurity for Internet VPNs and other
WAN traffic. Encryption using the
Blowfish algorithm and a 144-bit
encryption key is an optional feature
available for all Intel Express Routers.
This is some of the strongest encryption
technology available today, and forms
the basis for secure tunneling over the
Internet using Intel Express Routers.Because each Internet tunnel is set
up as a virtual WAN link, different
encryption keys can be used for
each tunnel.
-
8/8/2019 Enabling Secure Virtual Private Networks
6/12
Internet VPNswith Intel ExpressRouters
Setting up links to ISPs
Configuring secure VPN tunnels over
the Internet using Intel Express Routersis exceptionally easy. However, depending
on the particular circumstances of the
customers business and LAN config-
uration, appropriate steps should also
be taken to ensure the security of the
LAN from the Internet. This should
minimally include configuring access
control lists via protocol filters, but
could also include more sophisticatedmeasures such as multiple routers and
standalone firewall servers.
The first step in creating a secure VPN
with Intel Express Routers is to establish
an Internet connection for each LAN.
This is a traditional WAN connection,
but typically much less expensive because
it is a short distance connection to a local
ISP POP.
Once the physical connection is
made, a WAN link must be configured to
connect the router to the ISPs POP. For
permanent dedicated connections, this
is a simple, standard link. It requires
no special configuration of routers at
the local ISP POP other than being
configured as a static route with fixed
IP addressing.
When creating an Internet VPN over
a dial-up link, such as ISDN, there are
two additional considerations. First, when
the local ISP at the receiving end of the
communication receives the transmission,
it must dial-up the receiving site in order
to complete the connection. Not all ISPs
offer this service. Second, both the
sending and receiving sites must have
fixed IP addresses. Many ISPs offer
this as an option for business Internetaccounts, but dont offer it for consumer
dial-up accounts.
Once the WAN link to the ISP
POP has been established, all future
links can then be configured as tunnels
over the Internet WAN port. Link options
such as compression and encryption
can be enabled and any LAN protocol
filtering can be specified. Then usersneed only enter the IP address of the
router at the target site and enter the
same encryption key on both ends. A
different encryption key can be used for
each tunnel for further security. Figures 4
and 5 show a comparison of a traditional
WAN setup over a Frame Relay network
versus an Internet VPN.
Easy transmission via any ISP
Once the tunnel is configured, all LAN
traffic that is routed to the WAN is
first encrypted and encapsulated in the
TCP/IP protocol. The traffic is then
re-encapsulated in whatever WANprotocol is being used on the WAN
link to the ISP (PPP, Frame Relay, X.25,
etc.). With this second encapsulation, the
traffic is indistinguishable from any other
traffic crossing the link. It can therefore
travel as easily as standard Internet traffic.
ISPs dont have to perform any special
configuration of their equipment. And
since its encrypted, all data, even the
original source and ultimate destination
addresses, are completely hidden from
potential hackers.
Tunneling with Intel Express
Routers can be implemented with any
networking application over a typical
Internet connection. Companies dont
have to modify applications or add any
E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t
6
Figure 4. At each site, a router port is connected to the Frame Relay service, and then a virtual link is
configured to each of the remote sites.
Router
IP, IPX or Bridged LANtraffic encapsulated in PPP,Frame Relay or X.25
Long distance Private WAN link(PPP, Frame Relay or X.25)
Router
Site A
Site C
Router
Site B
Public Switched
Data Network PSDN (TELCO)
Traditional LAN-to-LAN connections over Frame Relay
-
8/8/2019 Enabling Secure Virtual Private Networks
7/12
E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t
7
specialized software to their LANs. The
simplicity and interoperability designed
into the Intel Express Routers make
them perhaps the easiest solution avail-
able today for secure LAN-to-LAN
connectivity over the Internet.Tunneling LAN protocols
and filtering
All LAN protocols and filtering
supported by Intel Express Routers
on a traditional WAN link can also be
supported over a tunnel. Given the
bandwidth constraints on the Internet,
its especially important to minimize
excess traffic with the Express RoutersWAN cost control features such as
controlled bridging, IPX filtering and
spoofing, IP filtering and triggered RIP.
AlternativeSolutions
With such desirable cost savings, numerous
VPN solutions are being proposed from
a variety of sources. VPNs can be imple-
mented in a number of different ways.Although each solution has its merits and
shortcomings, Intel believes that the router
is the best solution for LAN-to-LAN
connectivity for both the end customer
and the Internet Service Providers.
Router vendors
Because routers are designed for LAN-
to-LAN connectivity through a WAN,
providing LAN-to-LAN connectivity over
an Internet VPN is a natural extension
of their basic function. A router is
required for a LAN connection to the
Internet anyway, so adding VPN support
in the router requires no additional
investment for the end customer. And
since the traffic over the Internet is
standard, it requires no special configura-
tion or incremental equipment investment
for the Internet Service Provider.Not surprisingly, other router vendors
agree and have announced their intentions
to support VPNs and secure Internet
tunneling as Intel has done.
Application software developers
and operating systems
Some software developers are building
proprietary, secure Internet tunneling
capabilities right into their applications.
However, most companies use many
applications from different vendors.
Because of this, proprietary VPN
implementations can quickly create
administrative headaches and require
multiple logons and passwords that are
difficult for users.
Network Operating System developers
are also looking to enable VPNs within
their security infrastructures. To the
extent that a company is using the same
operating system everywhere, this may be
an acceptable solution, but will generally
require either a dedicated server or
significant resources on a shared server
to implement. If multiple operating
systems are in use, which is the case in
most companies, then it has the sameshortcomings as the application-based
implementations.
Figure 5. At each site, a router port is connected to the Frame Relay service and a real link is configured
to the ISP POP. Then a virtual link, or tunnel, is configured to each of the remote sites.
Intel Express Router
ISPPOP
PublicInternet
Secure Internet Tunnel:Encrypted, compressedLAN traffic (IP, IPX,bridged protocols)
Traditional WANconnection tolocal ISP POP (PPP,Frame Relay, X.25)
Site A
Site C
Site B
ISP POP
ISP POP
IntelExpress Router
IntelExpress Router
LAN-to-LAN connections via Virtual Private Network over the Internet
-
8/8/2019 Enabling Secure Virtual Private Networks
8/12
E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t
8
Firewall or dedicated devices
Firewalls were the first product category
to implement VPN solutions. Since most
business connections to the Internet
include a firewall, they might seem an
ideal place to implement VPNs. Butfirewall-based VPN solutions havent
caught on with end customers for several
key reasons. Firewalls are generally
IP-based and dont provide a means
of handling other LAN protocol traffic.
Many firewall-based solutions also
require per-user licensing, which can
get very expensive.
Dedicated devices or black boxes thatencrypt data are also available. They are
generally designed to fit seamlessly into
the network, but can be a costly and
somewhat redundant investment. Their
tunneling capabilities are similar to those
of Intel Express Routers but they dont
offer WAN connectivity or routing.
Figure 6 summarizes the advantages
and disadvantages of these alternativeVPN solutions.
The Internet VPN solution offered
by Intel Express Routers is simple
and elegant. Since it is implemented in
the router, it provides cost savings and
management efficiencies for the end
customer. And since it doesnt require
any changes in the LAN applications
that the customer is using, or in the ISPsnetwork configuration, there are virtually
no barriers to implementation.
VPN Implementation Options
Figure 6
Solution Pros Cons
s Customer depends on the ISPto make changes or additionsto private WAN configuration
s Require more complicatedconfiguration of customerpremises router equipment
s Some depend on adoptionof new protocols throughoutInternet infrastructure, delayingimmediate practical use
s L2TP, for example, willeventually become aninteroperable standardprotocol
Other router-basedsolutions
s Most dont support LAN protocolsother than IP
s Require more complex setupand configuration of firewall ateach site
s Charges for some are on a per-connection basis, resulting in amuch more expensive solution
s May require separate log-onprocess for users
s Some offer support forboth LAN-to-LANnetworking and client-to-LAN remote access
Firewall-based solutions
s Because these solutions aretypically still private WANs,the cost savings compared to atraditional private WAN througha telecommunications carrier arenot substantial
s Customer depends on the ISPto make changes or additions tothe private WAN configuration
s
Require more complicatedconfiguration of customerpremises router equipment
s Because these solutionsare typically still privateWANs, they offer betterQoS guarantees
s ISP can be paid toconfigure and manageeverything for thecustomer
ISP-based solutions
s Require more complex setupand configuration of applications,network security or remoteaccess servers at each site
s Applications and/or operatingsystems would likely have tobe upgraded to take advantage,adding significantly to imple-mentation costs
s These types of solutionsmay provide VPN securityusing a common user login
s PPTP provides supportfor remote LAN accessapplications
Application-based oroperating system-basedsolutions
-
8/8/2019 Enabling Secure Virtual Private Networks
9/12
E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t
9
The Futureof VPNs
Tunneling with Intel Express Routers
offers businesses a simple and cost-
effective solution for Internet VPNs today,
but its only the first step. As standards forsecure Virtual Private Networking on the
Internet are formalized, Intel will integrate
support for them into its routers. Since
tomorrows innovations are built on todays
standards, this compliance will offer
companies optimal flexibility in choosing
the best future technologies to meet their
specific needs.
The next important step for InternetVPNs is providing simple and secure
LAN access for remote users working
from home or on the road. Proposed
standards, such as L2TP, hold great
promise for allowing Remote LAN
Access (RLA) via an Internet VPN.
As mentioned, the Internet already
offers substantial benefits as a medium
for WAN communications. But unleashing
its full potential will require solutions to
two major limitations. First, the quality
of service (QoS) available over the
Internet must be improved to handle
time-sensitive applications, such as
audio, video and real-time data base
applications. Second, higher bandwidth
services must be available over the
Internet in order to offer a truly seam-less interface between the LAN and the
WAN. Intel is playing an active role in
addressing technical issues in each of
these areas. The ultimate solutions to
these problems will require a major
overhaul of the infrastructure itself
a change that will come only with
evolution of the entire Internet.
Quality of Service (QoS)
Because administration of the Internet
is a shared responsibility and the
network itself is a shared resource
service providers cant offer any
guarantees today with respect to latencyor throughput over the Internet. The
connection from one point to another
doesnt follow a set path and, like a chain,
is only as good as its weakest link.
This shared ownership of the infra-
structure is both the strength and the
Achilles heel of the Internet. Its
responsible for much of the growth
and vitality of the Internet as apopular medium. But it also means
that overcoming QoS limitations will
most likely require technical changes
throughout the massive Internet
infrastructure. However, the outlook
is good. Business and consumer demand
for improvement is so high that service
providers and key technology vendors
are working cooperatively andaggressively to develop solutions.
QoS over the Internet can be
improved in many ways. Some ISPs
offer what are essentially private WANs
that simply run on the same equipment
as their Internet traffic. However, the
typical cost is almost as high as a
traditional private WAN.
A number of companies in the
networking industry have come up with
a more comprehensive and cost-effective
solution. Cisco Systems Inc., Intel,
Microsoft and several major carriers
and ISPs are playing a leadership role
in an industry initiative to establish the
bandwidth reservation protocol (RSVP).
RSVP offers a standard means of
obtaining known, guaranteed bandwidth
over IP network infrastructures. A recent
study by Infonetics Research predicts that
the number of ISPs using RSVP will grow
from 4 percent in 1997 to 24 percent in1998. (Source: Infonetics Research Inc.,
The ISP Opportunity 1997, page 15.)
Several Intel Express Router models
already include support for RSVP, as
well as IP Multicast V2.
Bandwidth
Although the term high-bandwidth
is used to describe Internet connections
such as T1, the 1.5Mbps that a T1 con-nection offers is minuscule compared
to the 10Mbps and 100Mbps Ethernet
connections enjoyed on local area
networks. This disparity represents a
significant bottleneck when establishing
an Internet VPN or a private WAN. The
technology to upgrade the infrastructure
exists, but the enormous cost of upgrading
or changing the infrastructure of a net-work the size of the Internet poses a
daunting challenge.
Typically, the bottleneck occurs at
the last mile the connection from
a carrier or service provider to the
consumer or business location. The
best hope for improving the bandwidth
of these connections lies in new, cost-
effective last-mile solutions such asxDSL, cable or wireless technologies.
With increasing deregulation of tele-
phony services, many diverse solutions
that address the varying needs of
business and consumer applications
are likely to emerge.
-
8/8/2019 Enabling Secure Virtual Private Networks
10/12
E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t
10
Because of the enormity of the
problem, significantly higher bandwidth
for local access may take many years to
proliferate. But the need for Internet
VPN solutions today is spurring many
creative ways to make the most efficientuse of the Internet bandwidth that is
available. These include compression,
filtering and prioritization techniques
used in both WAN and Internet access
products such as Intel Express Routers.
Because of the demand for higher
bandwidth and better QoS for VPN
applications, many carriers and
ISPs are already making significantinvestments in their network infra-
structures to offer better baseline
services. This is an expensive
approach to solving the problems,
but it is effective and immediate.
Support for new, higher-performance,
last-mile telecommunications technologies
such as xDSL and new QoS technologies
such as RSVP will further enhance theInternet as a common networking infra-
structure. As these and other solutions
begin to proliferate through the Internet
infrastructure, the potential of the Internet
for WAN communications will continue
to grow. Intel will continue playing a
leadership role in this effort.
Conclusion
The common infrastructure offered by
the Internet promises to radically improve
the ease and affordability of WAN
communications. Already, VPNs with
Intel Express Routers offer an importantfirst step by safeguarding the privacy of
business communications as they traverse
the public infrastructure. By enabling
the Internet to be used as a low cost
alternative to a private WAN, Intel
Express Routers provide a simple means
of saving money today. And as part
of a coordinated, long-term Internet
strategy, they help lay the groundworkfor the future of network applications.
Since a complete WAN solution often
requires more than Internet VPNs, Intel
Express Routers also support multiple
protocols for traditional WAN routing
in a global networking environment.
With intuitive management tools and
comprehensive support for strong security
and cost-control, they provide a flexible,secure and cost-effective WAN solution.
Intel is also working to drive a range of
industry-wide efforts to meet tomorrows
challenges, such as interoperable standards
for security, quality of service and low-cost
high-bandwidth communications services.
With these developments, the solutioncurrently offered by Intel Express Routers
and secure Internet VPNs will expand
readily into the future, moving toward
the next era of WAN communications.
-
8/8/2019 Enabling Secure Virtual Private Networks
11/12
E n a b l i n g S e c u r e V i r t u a l P r i v a t e N e t w o r k s O v e r t h e I n t e r n e t
11
Intel Corporation, 1998.
* Third-party trademarks are the property of their respective owners. Please Recycle.
Intel Services
NORTH AMERICAN SERVICE CENTER: OREGON, USA
Intel BBS 1-503-264-7999
FaxBack* 1-800-525-3019 or 503-264-6835
Product Information 1-800-538-3373 or 503-264-7354
Technicians
Network and ProShare
Conferencing/Video Products 1-916-377-7000
CPU, OverDrive Processors
and Math Processors 1-800-321-4044
Phone Hours: 7:00 5:00 M-W, F
7:00 3:00 Th (US Pacific Time)
EUROPEAN SERVICE CENTRE: SWINDON, UK
Intel BBS +44-1793-432-955
FaxBack +44-1793-432-509
Product Information +44-1793-431-155
Technicians Hours (British Time)
English +44-1793-404-900 (08:00 midnight)
French +44-1793-404-988 (08:00 17:00, Tu 08:00 16:00)
German +44-1793-404-777 (08:00 17:00, Tu 08:00 16:00)
Italian +44-1793-404-141 (08:00 17:00, Tu 08:00 16:00)
ASIA-PACIFIC SERVICE CENTER: SYDNEY, AUSTRALIA
Product Information +61-2-9937-5800
Technicians +1-800-649-931 Hours: 05:00 15:00
ASIA-PACIFIC SERVICE CENTER: SINGAPORE
Product Information +65-735-3811
Technicians +65-831-1311 Hours: 05:00 15:00
ASIA-PACIFIC SERVICE CENTER: HONG KONG
Product Information +65-735-3811
Technicians +852-2-844-4456 Hours: 05:00 15:00
ASIA-PACIFIC SERVICE CENTER: KOREA
Product Information +65-735-3811
Technicians +822-767-2595 Hours: 05:00 15:00
ASIA-PACIFIC SERVICE CENTER: TAIWAN
Product Information +65-735-3811
Technicians +886-2-718-9915 Hours: 05:00 15:00
JAPAN SERVICE CENTER: TSUKUBA, JAPAN
Product Information and Technicians
Network and ProShare
Conferencing/Video P roducts +81-298-47-0800
OverDrive Processors and Math Processors 03-5454-1886
Hours: 09:00 17:00 M-F
modem settings: 8-N-1, up to 14.4Kbps Or contact your dealer or distributor.
Intel PC & LAN Products Customer Information and Support Phone Numbers
or find us on the World Wide Web at http://www.intel.com/network
FOR ALL OTHER INTERNATIONAL SALES
AND TECHNICAL SUPPORT QUESTIONS
Contact your local dealer or distributor or call the NorthAmerican Service center at +1-503-264-7354.
SUPPORT FILES ON THE INTERNET
Support information for Intel Brand products is availableon the Internet for downloading by Anonymous FTP andfor viewing or downloading on the World Wide Web.
World Wide Web address (URL)
Corporate: http://www.intel.comCustomer Support: http://support.intel.com
Intel FTP ServerHostname: ftp.intel.comFile directory location: /pub/support/enduser_reseller(For FTP Server access instructions, order document #9051)
MAILING ADDRESS
North American Service Center
Intel Customer SupportJF3-3335200 NE Elam Young ParkwayHillsboro, OR 97124-6497USA
European Service Centre
Branded Products Support CentreIntel Corporation (UK), Ltd.Pipers WaySwindon, WiltshireEngland SN3 1RJ
NOTE: Call our FaxBack service and order document #9089 for a current list of phone numbers.
CUSTOMER SUPPORT
Intel Customer Support Services offers a broad selection of programs including extended phone support, upgrades, parts replacement, on-site
services and installation. For more information, contact us on the World Wide Web at http://support.intel.com or call 800-538-3373, ext. 276.Service and availability may vary by country.
-
8/8/2019 Enabling Secure Virtual Private Networks
12/12
NP0894.01