Security Basics mailing list archives

RE: VPN overkill?


From: "David Gillett" <gillettdavid () fhda edu>
Date: Wed, 17 Nov 2004 08:55:28 -0800

  While site-to-site VPNs like this handle a fair bit of bandwidth,
they use a relatively small number of tunnels.  Mostly, the places
I've used concentrators have been either 

(a) for client-to-site deployments, with a large number of 
    separate tunnels (mostly of fairly modest bandwidth), or

(b) places where the encrypted bandwidth was so great that one
    or more hardware encryption processing modules were justified.

  It doesn't sound likely that your situation meets either profile,
so I'd expect the VPN capabilities included in many routers and
firewalls should be adequate.
  You may be able to sell this on the basis of a pilot deployment
using on-hand/low-cost gear, with a plan to upgrade when (if!) 
traffic demands warrant it (see b above).

David Gillett


-----Original Message-----
From: Ted A [mailto:arcturous () hotmail com]
Sent: Tuesday, November 16, 2004 2:17 PM
To: security-basics () securityfocus com
Subject: VPN overkill?


All,
First off, good fun reading this list. Some really great 
advice and good 
thinkers on here. Thanks for the great questions and great answers.

So here's my issue. I have an IT infrastructure manager who 
has raised a 
requirement I find myself questioning.
We have a goal of connecting a remote office to a central 
office via a VPN. 
This manager insists that only acceptable way to accomplish 
this is by 
connecting 2 VPN concentrators. I debate this, noting that a 
PIX should be 
more than capable of handling this connection at the remote 
office and the 
only place the concentrator is needed is at the central office.
Am I completely off my rocker, thinking that a second 
concentrator for a 
single connection is a little overboard?

Thoughts?
Thanks,
Ted




Current thread: