VPN Design and Deployment

Las Vegas, NV, Interop, Spring, 2001

Virtual private networks have become a standard tool for the network manager. VPNs are now accepted as a way to increase security in an insecure world, and to leverage the remarkable cost-effectiveness of the public Internet as a site-to-site, Extranet, and remote access network.

VPN design and deployment is an emerging industry practice. While the basic security principles are well known, it is not always clear how to integrate security products such as VPNs into existing network infrastructures. VPNs affect more than just security: topology, routing, addressing, and multiple protocols all complicate VPN implementation.

This seminar will show network managers and security professionals how to build real-world IPsec-based VPNs and integrate them into their existing network infrastructure. Through a combination of methodology and technology, you’ll learn how to take the promises of VPN technology and merge them into real, running networks. We’ll show you general design principles which are important in any VPN implementation, including addressing, firewalls, routing, security, and authentication. Then, we’ll focus on site-to-site and Extranet issues: how to design and deploy site-to-site VPNs within and throughout your business. Next, we’ll show you how remote access VPNs can be securely established and managed, along with critical security issues for any remote access network.

During this seminar, the speakers will build up a case study and use product demonstrations to show real-world examples of how a VPN is designed, deployed, installed, and managed.

Speakers include:

Frederick Avolio, Avolio Consulting, Inc.

Dave Piscitello, Core Competence, Inc.

Joel Snyder, Opus One

The sessions are:

9:00am

– 10:00am

General Issues in Design and Deployment

  • Addressing
  • VPNs and firewalls
  • Decision making methodology
  • Case Study/Demo: Firewalls

10:00am

– 10:15am

BREAK

10:15am

– 11:15am

Routing issues

  • Routing
  • Fragmentation
  • Multi-protocol and Multicast/Broadcast
  • High Availability
  • Case Study/Demo: High availability

11:15am

– 11:30am

BREAK

11:30am

– 12:15pm

Security issues

  • Choosing IPsec parameters
  • Authentication options
  • Integration of legacy methods and PKI
  • Case Study/Demo: Integrating with RADIUS server

12:15pm

– 1:30pm

LUNCH

1:30pm

– 2:30pm

Integrating security gateways into your network

  • Planning methodology for gateways
  • Installing gateway hardware
  • Hardware and LAN issues
  • Case Study/Demo: Installing a Gateway

2:30pm

– 2:45pm

BREAK

2:45pm

– 3:45pm

Implementing Site-to-Site VPNs

  • Planning methodology for tunnels
  • Building tunnels and topology choices
  • Management, Debugging and Troubleshooting
  • Case Study/Demo: Building a Tunnel

3:45pm

– 4:00pm

BREAK

4:00pm

– 5:00pm

Implementing Remote Access VPNs

  • Planning methodology
  • Authentication within Remote Access
  • Deployment and Desktops

5:00pm

– 11:59pm

Wild drinking and carousing