09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

equired) can be sent across public backbone <strong>network</strong>s in a secure manner. VPNs<br />

offer tremendous cost savings <strong>to</strong> companies that need private connectivity between<br />

offices. See Figure 9.3 for a point-<strong>to</strong>-point tunneling <strong>to</strong>pology example.<br />

Figure 9.3. A point-<strong>to</strong>-point tunneling example.<br />

There are two types of VPNs: encrypted and unencrypted. Unencrypted VPNs<br />

encapsulate data inside of a tunneling pro<strong>to</strong>col packet. With an encrypted VPN, <strong>the</strong><br />

pro<strong>to</strong>col datagram reaches <strong>the</strong> VPN gateway, where it is encrypted and placed<br />

inside ano<strong>the</strong>r pro<strong>to</strong>col datagram for delivery. When <strong>the</strong> datagram reaches <strong>the</strong><br />

destination router, <strong>the</strong> packet is decrypted and forwarded on <strong>to</strong> its destination host.<br />

Several open and private VPN encryption standards exist. Secure Shell (SSH),<br />

Point-<strong>to</strong>-Point Tunneling Pro<strong>to</strong>col (PPTP), SOCKS, and IPSec are all popular secure<br />

tunneling methods. All <strong>the</strong>se tunneling approaches use some combination of <strong>the</strong><br />

40-bit data encryption standard and RSA public key encryption. The Cisco IOS<br />

supports VPNs through both encrypted (DES-40, DES-56, DES-128-bit) and<br />

unencrypted tunnels.<br />

NOTE<br />

DES is a private key cryp<strong>to</strong> algorithm based on a 56-bit encryption key, in which<br />

both <strong>the</strong> sender and receiver share a common key. RSA is a public key encryption<br />

system in which two keys are used: a public key used <strong>to</strong> encrypt data, and a private<br />

key used <strong>to</strong> decrypt data. There are no specific minimum and maximum RSA key<br />

lengths. However, most applications use key sizes ranging from 56 <strong>to</strong> 1,024 bits in<br />

length. Data encryption is a complex subject far beyond <strong>the</strong> scope of this book. See<br />

<strong>the</strong> references at <strong>the</strong> end of <strong>the</strong> chapter for resources providing information on data<br />

encryption.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!