RE: [nsp] questions on 4006, 6509 *SFC cards

From: Zach Wilkinson (zach.wilkinson@sjsu.edu)
Date: Wed Apr 17 2002 - 14:57:46 EDT


Actually, when I say VPN I'm talking about dialin RAS/VPN, like Microsoft
RRAS or Checkpoint VPN-1.
You put your access points and a RAS/VPN server in an isolated VLAN. After
installing a dialable VPN client on the notebook the user dials the VPN
server to establish an encrypted connection (PPTP, or whatever). This
connection tunnels through the access point, through the wired VLAN to the
VPN server. The traffic comes out of the VPN server just like any dialin
RAS user, most likely over a different interface.
The all traffic between the notebook and the VPN server is encrypted.
-
Zach Wilkinson
Engineering Computer Systems
San José State University
zach.wilkinson@sjsu.edu

"K.A. Long" <klong@UBmail.ubalt.edu>
04/17/2002 09:27 AM
Please respond to klong

 
        To: Zach Wilkinson <zach.wilkinson@sjsu.edu>
        cc:
        Subject: RE: [nsp] questions on 4006, 6509 *SFC cards
->I may not be understanding what you are trying to do but the reason
->I found for using VPNs with wireless is because the wireless portion is
->unsecure, not so much the wired portion.

O.k., this is some of the clarification I was looking for. But it still
doesn't answer the bigger question of whether or not you can use
the RSFC/MSFC card to terminate the VPN tunnels using some
sort of protocol rather than a VPN concentrator or router. These
two solutions were talked about in a couple of the presentations
I looked at. Maybe I need to go back and look at the diagrams and
associated descriptions again.

Thanks!

Kimberly Long

University of Baltimore
410-837-5021 (w)
1420 N. Charles St.
443-829-6535 (m)
Baltimore, MD 21201
klong@ubalt.edu
kim@pager.ubalt.edu
(subject-line e-mail only)



This archive was generated by hypermail 2b29 : Sun Aug 04 2002 - 04:13:41 EDT