Introduction To VPNs

Las Vegas, NV, Interop, Spring, 2001

Virtual private networking promises to solve a range of problems faced by enterprises today. Organizations that depend on remote access for a growing portion of their intra-business communication must address the potential vulnerability of their mission critical applications. As the percentage of mobile employees continues to increase, virtual private networks (VPNs) may be the best means of controlling both cost and the security of the enterprise.

The impact of VPNs goes beyond secure and cost-effective remote access. Currently emerging security technology and public key infrastructure will enable secure inter-business collaboration through secure extranets. As VPN technology continues to mature, organizations will increasingly utilize public Internet services for LAN-to-LAN communications, intranets and other mission-critical application service networks.

This unique seminar is designed to help the IT professional quickly learn the most critical business, technology, and deployment aspects of VPNs. Through a combination of technology presentations, case studies, and demonstrations, you’ll gain practical knowledge about VPNs. We’ll talk you through the alphabet soup of PKI, L2TP, IPsec, IKE, SSH, TLS/SSL, and more. We’ll take a look at recent technology advances and how they’ll impact VPN implementation. We’ll show you how VPNs have been implemented with real-world case studies and exclusive demonstrations conducted by our impartial team of experts.

Speakers include:

Frederick Avolio, Avolio Consulting, Inc.

Dave Piscitello, Core Competence, Inc.

Joel Snyder, Opus One

The sessions are:

9:00am

– 9:15am

Introduction to VPNs

  • Overview of seminar
  • Briefly introduce the kinds of VPNs
  • Note: This class covers secure VPN, not QoS VPN

9:15am

– 10:00am

Cryptography for VPNs

  • Basics of packet and message signing
  • Secret and public key techniques
  • Use of cryptography for VPNs

10:00am

– 11:00am

Public Key Infrastructure for VPNs

  • Elements of PKI used by VPNs
  • Certification Authorities, protocols, repositories, CRLs
  • Live Demonstration

11:00am

– 11:15am

BREAK

11:15am

– 12:15pm

Secure Remote Access Using Layer 2 VPNs

  • Evolution of L2TP, when to use
  • Outsourcing secure remote access to your ISP
  • Live Demonstration

12:15pm

– 1:15pm

LUNCH

1:15pm

– 2:45pm

Layer 3 Secure IP VPNs

  • IPsec and IKE services, operation, use of PKI
  • Comparison of CPE and Network-Based VPNs
  • Integrating legacy authentication, adding support for OTP, RADIUS, SecurID, use of DHCP for tunnel configuration
  • Remote Access with L2TP and IPsec
  • Live Demonstration

2:45pm

– 3:30pm

Securing Application Streams

  • Secure Shell (SSH)
  • Secure Sockets Layer (SSL), Transport Layer Security (TLS)
  • Secure Applications vs. IPsec-based VPNs
  • Live Demonstration

3:30pm

– 3:45pm

BREAK

3:45pm

– 4:45pm

VPN Case Studies

  • L2/L3 VPN Case Study
  • Firewall Case Study
  • Multi-Level VPN Case Study
  • Network-Based VPN Case Study

4:45

– 5:15pm

Conclusions

  • Common Myths about VPNs
  • Questions To Ask VPN Vendors
  • What to include in an RFQ/RFP

5:15pm

– 6:00pm

Reception