throbber

`
`
`
`CH1Sa1m
`VJXSE0CS.1C
`fih
`
`lit
`
`1014
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 1 of 46
`
`

`

`
`
`
`
`
`
`Networks
`
`VirtualPrivate
`
`Making the Right Connection
`
`Dennis Fowler
`
`netWorker Magazine,
`Association for Computing Machinery
`
`M {4®
`
`MORGAN KAUFMANN PUBLISHERS, INC.
`San Francisco, California
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`
`Page 2 of 46
`
`
`
`
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 2 of 46
`
`

`

`Senior Editor
`Director of Production and Manufacturing
`Production Editor
`Editorial Assistant
`Cover Design
`Cover Image
`TeXt Design
`Copyeditor
`Proofieader
`Composition and Illustration
`Indexer
`Printer
`
`Jennifer Mann
`Yonie Overton
`Cheri Palmer
`Karyn Johnson
`Ross Carron Design
`© Patrick Ingrand/Tony Stone Images
`Side by Side Studios
`Jeff Van Bueren
`Jennifer McClain
`Technologies ’n Typography
`Ty Koontz
`Courier Corporation
`
`Designations used by companies to distinguish their products are often claimed as trademarks
`or registered trademarks. In all instances where Morgan Kaufmann Publishers, Inc. is aware of a
`claim, the product names appear in initial capital or all capital letters. Readers, however, should
`contact the appropriate companies for more complete information regarding trademarks and
`registration.
`
`Morgan Kaufmann Publishers, Inc’.
`Editorial and Sales Office
`840 Pine Street, Sixth Floor
`San Francisco, CA 94104—3205
`USA
`
`Telephone
`Facsimile
`Email
`WWW
`Order toll free
`
`415 / 392-2665
`415 / 982-2665
`Inkp@ml<p. com
`http://wwwmkp. com
`800 / 745-7323
`
`© 1999 by Morgan Kaufmann Publishers, Inc.
`All rights reserved
`Printed in the United States of America
`
`0302010099 54321
`
`
`
`
`
`
`
`castsssxsvasa3y
`
`No part of this publication may be reproduced, stored in a retrieval system, or transmitted in
`any form or by any means—electronic, mechanical, photocopying, recording, or otherwise—
`without the prior written permission of the publisher.
`
`Library of Congress Cataloging-in—Publication Data
`
`Fowler, Dennis.
`Virtual private networks : making the right connection / Dennis
`Fowler.
`cm.
`p.
`Includes bibliographical references.
`ISBN 1-55860-575-4
`1. Extranets (Computer networks) 2. Business enterprises—computer networks.
`3. Internet (Computer network)
`4. Computer networks—S ecurity measures.
`I. Title.
`TK5105.875.E87F69 1999
`650’ .0285’46-DC21
`
`99-13845
`CIP
`
`'
`
`Cisco Systems, Inc.
`Exhibit 1014
`
`Page 3 of 46
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 3 of 46
`
`

`

`
`
`
`
`
`
`
`
`
`a lmost lost in the glare and thunder of the Web is the fact
`
`that, at its heart, the Internet is a communications me-
`dium. Like the telephone network, it can serve many
`functions. Several years ago a few pioneering businesses and organizations
`discovered that, by using the public infrastructure of the Internet and its ilk,
`they could tie offices and facilities together in a new, exciting, cost-effective
`way, no matter where they were located, by building virtual private networks
`(VPNs). VPNs use robust, redundant public networks such as the Internet, in-
`stead of expensive and vulnerable leased lines, for their Wide area networks
`and extranets. These businesses also discovered that, by letting their road
`warriors log on to the home network through the Internet, they could be freed
`from the expensive tyranny of long-distance dial-up telephone networks for
`remote access to the home network.
`'
`This interest caught the attention of Internet and networking service pro—
`viders and of major networking hardware and software developers and ven-
`dors, all of whom are now feeding this burgeoning market. These include
`communications giants such as AT&T, MCI, and Sprint,- networking hard—
`ware stalwarts such as Cisco and 8Com; software players such as Microsoft,
`\Check Point, and Novell; and hundreds of others.
`As VPN technologies have developed, so, too, has massive confusion—con-
`fusion as to just what a VPN is, what it can do for you, and how to implement V
`one.
`,
`
`This book is intended to clear away the confusion. It explains what VPNs
`are, what they can do for you, and how they work, and it lays out the choices
`you have in planning and implementing your own Virtual private network.
`The book also tells you what to expect once you have a VPN up and running.
`It covers both the positive side of VPNs and the pitfalls to avoid as you con-
`sider this technology.
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`
`Page 4 of 46
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 4 of 46
`
`

`

`
`
`
`
`
`I PREFACE
`
`Audience
`
`The book is aimed at executives, managers, and upper—level technicians who
`are unfamiliar with VPNs and the technologies that make them possible. If
`you are a manager looking for a way to connect your office network in New
`York with the factory in Potstown, or you are trying to cut the phone bills of
`your reps around the country, this is the book for you. It shows you how you
`can give your mobile sales force direct access to the home office network so
`they have the latest product information. It explains how the Internet can be
`used to tie together the local area networks in your satellite facilities into one
`super network so that the entire workforce can be brought to bear on an op-
`, portunity or problem.
`
`A Road Map
`
`To simplify your reading, the book is divided into three sections. If you are a
`manager or an executive unfamiliar with VPNs, you should begin at the be-
`ginning. The first three chapters will show you just exactly what a VPN is
`and, drawing on real-life examples of VPNS in use today, what it can do for
`you. To keep you from getting too rosy a View of the situation, however, you
`will also see that VPNs have their risks, just as they have their rewards. We at—
`tempt to give you a balanced perspective so that you can make a reasonable
`decision as to whether a VPN is‘really what you want to get involved with.
`Chapter 4 is a bridging chapter, of interest to executives and managers as
`well as to the more technically oriented. It discusses the choices of networks
`you have for implementing your VPN. While it does carry information for the
`technically inclined, this information is also important for managers as well,
`to help them understand that the Internet is not necessarily the best choice
`for a VPN substrate, that there are other options that it is important to ex-
`plore, What those options are, how they work in comparison to the Internet,
`and the advantages and disadvantages of the available infrastructures.
`The middle section of the book, beginning with Chapter 5, is more tech-
`nically oriented and is aimed more at the technician,- it discusses the various
`elements that go into a VPN. One of the crucial problems is keeping your pri—
`vate data private as it traverses the public networks, and this is where encryp—
`tion comes into the VPN picture. In Chapter 5, you’ll get a thorough ground-
`ing in what encryption is, what the various types of encryption are, and how
`they are combined and implemented to protect your data. Chapter 6 contin-
`ues this theme by discussing the problems that encryption itself raises: au—
`thenticating users for access to data, verifying the integrity of the data after it
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`
`Page 5 of 46
`
`
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 5 of 46
`
`

`

`
`PREFACE I
`
`has been transmitted, and ensuring that only the right people get the keys
`needed to decrypt the data. Chapter 7 ties all this together with a discussion of
`the various protocols there are to choose from to implement your VPN, proto—
`cols that incorporate encryption, authentication, and key management along
`with tunneling and other elements needed to provide secure connections
`through public networks. This chapter discusses the latest work of the
`Internet Engineering Task Force to bring order to the chaos of VPN protocols.
`Chapter 8 discusses the basic architecture decisions you will need to make,
`whether in hardware or software, which will strongly depend on your own
`situation.
`The book’s last two chapters get down to the nuts and bolts of implement-
`ing a VPN. Chapter 9 steps you through the process of planning your VPN. It
`discusses the many factors—technical, financial, and human—that you must
`consider as you embark on your project and the step-by—step planning you
`should follow so you can implement a VPN that meets your needs. Chapter 10
`tells you what to expect once you get your VPN up and running: the issues
`that you must be prepared to deal with and what you can expect when you are
`managing it.
`
`Content
`
`This book, quite deliberately, is not brand or product specific, although it does
`describe most of the proprietary and nonproprietary VPN solutions that are
`currently available. The market is changing too rapidly to be more specific.
`During the course of the writing of this book, new companies entered the
`market and others left; new protocols appeared and old ones faded. For exam-
`ple, it was just as the first draft was nearing completion that Sun Micro—
`systems introduced Sun.NET, a new java—based VPN technology.
`What this book seeks to do is show you the basic principles at work and the
`strengths and weaknesses of major products that will be available when you
`have this hard copy in your hands, to allow you to select those that will best
`meet your needs.
`'
`To help deal with the jargon, this book includes a glossary of Internet and
`VPN terms for easy reference. A bibliography gives recent literature, both cor-
`porate and public. There are also two appendices. Appendix A presents a list of
`VPN developers, vendors, and service providers. This is anything but a de—
`finitive list—again, the technology and market are changing too rapidly for
`that—but the list will offer a wide variety of contacts for you as you plan your
`project. Appendix B lists a number of resources you can tap into that relate to
`the Internet and VPNs.
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`
`Page 6 of 46
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 6 of 46
`
`

`

`
`
`gli- XVIHEI
`I PREFACE
`
`Acknowledgments
`
`As with any book of this nature, there is no way that I could have done this
`alone. Throughout its creation I have been aided by many people. The willing-
`ness of busy IT professionals to share that most valuable resource, time, never
`ceases to astonish me. Foremost among them are Glenn Botkin of Galaxy
`Scientific Corporation, Pat Patterson of Mazzio’s Corporation, and Ariel
`Friedman, Earl Evans, and Mike Gentry.
`Then there was the assistance of those who are directly involved with mak—
`ing this technology available and workable: Mark Elliot and Keith R. Wilber of
`Check Point Software; Rob Spence, Director of Product Marketing, Aventail
`Corporation,- Christopher Ian Ogg and Steve May of The Wizard’s Gate;
`Tim Gerchar, Product Marketing Manager for Compatible Systems Corpo-
`ration; Kevin Kalajan of Sun Microsystems; and Carey Knapper 0f Lucent
`Technologies.
`For helping with the development of the original proposal and outline, and
`for their patient reviewing of my manuscript as it grew, I must particularly
`thank Glenn Botkin, PC Week Contributing Editor Brian D. Iaffe, DuPont’s
`Mike Minnich, Freelink Communication’s David Dennis, Sportsline’s Dan
`Leichtenschlag, and especially Marcus Ranum of Network Flight Recorder,
`Inc. for his vitally valuable assistance as I wrestled with the labyrinthine com-
`plexities of encryption, authentication, and key management. I’m also partic-
`ularly grateful to Susan Scheer Aoki of .Cisco Systems, not only for contribut-
`ing the Foreword for this book but also for her valuable suggestions, especially
`with regard to her insight on the developing trends in VPN technology.
`Finally, I must thank my editor at Morgan Kaufmann, Jennifer Mann, and
`her endlessly patient assistant, Karyn Johnson, and my production editor,
`Cheri Palmer, for bearing with me as, together, we beat this project into shape.
`
`
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`
`Page 7 of 46
`
`
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 7 of 46
`
`

`

`
`
`Defining the Virtual
`Private Networks
`
`Virtualprivate networks (VPNS) havebecome ahot issue,
`
`the latest industry buzzword, one of the new "killer
`apps” of the Internet. Everything from extranets to work—
`group systems to electronic commerce solutions has been hit with the tag
`"virtual private network.” VPNs are being touted as incredible cost savers,
`infinitely flexible, and infinitely scalable. They can leap the broadest ocean
`and connect your most peripatetic account executive to the home network
`from anywhere in the world. Within reason, VPNs really are capable of all of
`those things. By leveraging the connective power of the Internet or other
`shared—backbone networking services, they do offer tremendous opportuni-
`ties for expansive but cost-effective connectivity.
`But beware of the hype. VPNs can offer awesome opportunities and bene—
`fits, but there are also some hidden costs and dangers, and some of the claims
`made for VPNs are exaggerations. Furthermore, the lack of standards has re-
`sulted in a welter of competing and not always compatible VPN products ar-
`riving on the market from firewall, router, and other network hardware ven—
`dors, as well as from software developers. Add to that the number of different
`ways there are to create a VPN, the variety of network services on which they
`can be created, the number of ways it is claimed they can be used, and the al-
`leged (and sometimes inflated) benefits asserted to accrue from VPNs, and the
`confusion is monumental.
`
`For example, marketers of network services other than the Internet will as—
`sure you the Internet is not the only medium on which a VPN can exist,
`which is true. However, this leads to VPNs also being sold by providers of net—
`working services often described as frame relay or asynchronous transfer
`mode (ATM) networks, networks that are frequently promoted or at least im-
`plied to be totally distinct from the Internet, which they may be. But part of
`the confusion on this score arises because the line between some of these
`
`
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`
`Page 8 of 46
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 8 of 46
`
`

`

`VIRTUAL PRIVATE NETWORKS
`
` '
`
`1
`
`“private” public networks and the extremely “public” Internet as we think of
`it is anything but distinct; because these network service providers are fre-
`\ quently also Internet service providers, the confusion is further compounded.
`If you’ve done a search on the World Wide Web for the keywords Virtual pri—
`vate network or VPN, you’ve probably even discovered that for years compa-
`nies like Pacific Bell have been marketing an extended telephone service us—
`ing the same terms.
`>
`Thanks to all this confusion, it can be very hard to understand exactly what
`qualifies as a VPN, how a VPN can be implemented, and exactly what a VPN
`can and cannot do for you. That’s what we’ll explain for you here.
`
`1.1 What Is a VPN?
`
`Very simply put, a Virtual private network uses a public network’s infrastruc—
`ture to make the connections among geographically dispersed nodes, instead
`of using cables owned or leased exclusively for one single network’s use, as is
`typical for a wide area network (WAN). To the user, a VPN looks just like a pri—
`vate network, hence the Virtual in its name, even though it is sharing a web of
`cables with the traffic of hundreds or thousands of other users at the same
`time. It has all the characteristics of a private network—limited access to only
`authorized users, for example—even though it is sharing the same public in-
`frastructure with other users. Another way to describe it is that a VPN is a log—
`ical local area network (LAN) that connects an organization’s geographically
`dispersed sites in a way that makes them all appear to be part of one single
`network.
`There are a variety of public networks that can be employed to make a
`VPN’s connections, but the most prominent and most public network avail—
`able is, of course, the Internet. Because the Internet is everywhere and the
`Internet is where most of the VPN development is taking place, and because it
`is, as we’ll see, the most ubiquitous and cost—effective medium for a VPN,
`we’ll concentrate on VPNs running over it in this book. We will devote Chap-
`‘ter 4 to VPNs implemented through other networking services, and we will
`explain the differences in detail at that time, but since the Internet is the
`predominant medium and the technology is essentially the same regardless
`of the network being used, the Internet is Where we will concentrate our
`discussion.
`To illustrate how a VPN differs from a typical WAN, let’s look at a leased—
`line network, as shown in Figure 1—1, and then show how a VPN differs from
`it. For the sake of simplicity, this is only a three-node network, a company
`headquarters and two branch offices linked together with three leased lines.
`
`
`
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`
`Page 9 of 46
`
`
`
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 9 of 46
`
`

`

`
`
`
`1.1 WHAT IS A VPN? I
`
`
`
`
`
`
`
`Company
`headquarters
`
`Leased
`lines
`
`Branch office
`
`Branch office
`
`Figure 1-1 A typical leased-line wide area network.
`
`Each office has to have a cable connecting it to each of the other facilities. An-
`other arrangement would be to have the leased lines go through a hub, perhaps
`in the company headquarters.
`Either way, with this type of network, the company actually owns the cable
`or pays a monthly fee for every mile of cable connecting its facilities, whether
`that cable is in use 10 % or 100% of the time, whether it is being used to capac-
`ity or only a fraction of the capacity they’re paying for. The costs escalate with
`every mile that separates the offices and with every node that is added to the
`network (requiring more strings of cable to connect it to the rest of the organi—
`zation). Economies of scale are limited to what you can negotiate with the
`line provider, who is trying to recover from you all the costs for those cables.
`Your message uses only those cables to get from point to point; there are no
`detours. Send a packet of data in one end of the cable and it travels right down
`that cable to the destination. It works much the same way the LAN connect-
`ing your office to the file server on your LAN does. This is a nice, secure con—
`nection, but it also means that if the cable is cut, perhaps by a backhoe opera-
`tor putting in an irrigation line in an Iowa cornfield, that connection is down
`for the count. It will stay down until either the break is repaired or the traffic
`is rerouted manually around the break (if your agreement with the service pro—
`vider offers that guarantee).
`In a similarly simple three—node VPN, as Figure 1-2 shows, leased lines are
`dispensed with in favor of connecting each site to a public network. Instead of
`the hardwired pipeline between nodes of a standard wide area network using
`dedicated connections, the connections of a VPN are made through the web of
`cables, what is often described as the “cloud,” of a public network such as the
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`
`Page 10 of 46
`
`
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 10 of 46
`
`

`

`
`
`
`
`'7 l
`
`VIRTUAL PRIVATE NETWORKS
`
`
`
`
` Public network
`
`(Internet, frame relay,
`
`
`ATM, etc.)
`
`Branch office
`Branch office
`Figure 1-2 The same company using a VPN instead of leased lines.
`
`Internet. Each office requires a single connection, most commonly a leased
`line and commonly referred to as a local loop, to the nearest public network
`point ofpresence (POP). That POP may be only a few feet away or it may be
`miles away. From that POP the data is carried by the web of connections—the
`cables, routers, and switches that make up the public network—to the POP
`serving the destination office, then through the local loop at that end on to
`their final destination.
`As you can see, the connections—the local loops—between your com-
`‘ pany’s offices and the public network are dramatically shortened. They can
`even be the "dry copper” comiection provided by your local telephone service,
`perhaps an Integrated Services Digital Network (ISDN) connection. The costs
`for these short connections are correspondingly lower.
`Within the cloud, however, as opposed to the leased-line design, there is no
`one single connection between point A and point B. Instead there is a web or
`matrix of cables connected by routers that the messages travel through. Byus-
`ing a public network—the Internet, for example—a network shared by hun—
`dreds or thousands or millions of other users, the cost of all those miles of ca-
`ble is shared. We’ll see further on in this chapter that this sharing can produce
`impressive savings.
`\
`It is also much more fail-safe than a single leased line, since a message can
`take any one of a number of different routes to its destination. It provides a re~
`dundancy, a safety net, that Virtually guarantees that the traffic will continue
`to flow reasonably smoothly. If one cable is cut, the message will simply be
`routed automatically around the break to its destination, a service that is not
`generally available with a leased line.
`
`'
`
`Cisco Systems, Inc.
`Exhibit 1014
`
`Page 11 of 46
`
`
`
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 11 of 46
`
`

`

`
`
`
`
`
`1.2 WHAT A VPN IS GOOD FOR I
`
`1.2 What a VPN Is Good for and Why You Should
`Consider Building One
`
`There are several uses for a’VPN. It can be an extended intranet, connecting
`geographically distant facilities into a cohesive network. It can also be an
`extranet, linking, for example, customers and suppliers for increased efficien—
`cies, such as electronic data interchange (EDI). Looked at this way, a VPN can
`do Virtually anything that a more traditional leased—line WAN can do. In fact,
`so far it doesn’t seem to offer services much different from any WAN.
`But there is a third service that a VPN can offer that no leased-line WAN
`can offer, and that is in providing remote access services. A VPN lets road war—
`riors with their laptops connect into the home office through an Internet ser—
`vice provider, riding through the public Internet to log on to the office net—
`work, rather than running up long—distance charges by dialing up to a remote
`access server thousands of miles away. As we’ll see, that offers potentially im—
`pressive savings. While a VPN as an extranet or intranet offers some cost
`efficiencies over the typical WAN, the savings produced by using one for re-
`mote access are significant.
`Hence the excitement that has developed over VPNs. Building a VPN
`would seem, at first glance, to be simple common sense. Why not take advan-
`tage of an existing infrastructure for the connections, instead of going to the
`expense of stringing your own cable or paying someone else to drag fiber
`through conduit to tie your facilities together? Or Why go to the expense of
`leasing dedicated connections when they may only be used to a fraction of
`their capacity or for only a fraction of the time?
`It does make sense, but as you’ll see, there are downsides to VPNs. But be-
`fore we take a look at the potential negative points to VPNs, let’s see what the
`potential benefits are. As we said, there is a powerful logic to using an existing
`infrastructure to connect your facilities, rather than building your own.
`The claims made for VPNs make them sound like the greatest invention
`since the electric light. The primary advantage cited is that a VPN is vastly
`less expensive than a network using leased lines. As we already mentioned,
`the VPN is also claimed to be more flexible and scalable, compared to a tradi-
`tional WAN. Then, too, by using the international resources of the Internet,
`the vendors say that a VPN can offer connectivity virtually anywhere in the
`world. Finally, you’ll hear that a VPN is an extremely cost~effective way to
`service a mobile workforce of telecommuters and road warriors.
`To a degree, believe it or not, it’s safe to say that most of these claims are
`true. Fortunately, some of them, such as actual dollar savings, are even mea-
`surable, while others are less tangible but no less real.
`
`r
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`
`Page 12 of 46
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 12 of 46
`
`

`

`
`
`VIRTUAL PRIVATE NETWORKS
`
` I
`
`l
`
`1.2.1 Economies of Sharing
`
`It’s a fact that a VPN escapes the cost of leasing the cables to connect your net-
`work. By using an existing public network for your VPN, you are sharing the
`cost of that public network with all the other customers. The cost of the pub-
`lic network is spread over a large customer base. You’re not paying every
`month, by yourself, for every mile of each leased line, whether it is fully
`loaded 24 hours a day, 7 days a week or not. In most cases you’re paying a flat,
`monthly fee that is a fraction of what you would pay for leased lines providing
`the same service.
`
`Compare it to your personal telephone service, for example. While you pay
`a base charge for the local loop between your home and the telephone com—
`pany’s central office a block or two away, whether you are using it or not, you
`do not pay for every inch of cable between your home in Poughkeepsie, New
`York, and your daughter’s dorm room at college in Palo Alto, California,
`Whether you are using it or not, at least not directly. That cable is shared by
`thousands of callers, each paying perhaps a dime a minute for the time they
`are actually "online."
`In the past, on long-distance telephone circuits, one call used one cir—
`cuit, which was one pair of Wires that could be traced from your home in
`Poughkeepsie to your daughter’s dorm in Palo Alto. When you hung up on
`that call another took its place on the long—distance trunk, so at least you were
`only paying for time used. Today calls are multiplexed on that long~distance
`circuit, with the “silence” between words being filled with parts of other con—
`versations. This spreads the cost of the wire over more than one customer, al-
`lowing each of them to enjoy the benefit of lower long-distance rates. From
`three dollars for 3 minutes the rates have dropped to three dimes for 3 min-
`utes. But your conversation will still be carried over one circuit between
`Poughkeepsie and Palo Alto.
`A packet—switched network such as the Internet allows even greater multi—
`plexing, and thus greater efficiency, as each message is broken up into pack-
`ets, and each packet is slotted in with others from other users and routed
`through a web of connections. No one circuit becomes overloaded, at least in
`theory, and every circuit, at any second, is efficiently utilized, carrying pieces
`of perhaps thousands of conversations. It also provides a safety net that a
`circuit-switched network or a leased line does not. If one link is overloaded or
`goes down, the traffic is automatically rerouted to its destination. (For a more
`complete description of how the Internet works, see Section 4.1.1.)
`More importantly, the cost of all the fiber and copper and switches and
`routers is being spread over the millions of customers the Internet serves. You
`are leveraging to your advantage the investment in the hundreds of thousands
`of miles of cables and the uncounted routers and switches that go into making
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`
`Page 13 of 46
`
`
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 13 of 46
`
`

`

`
`
`
`1.2 WHAT A VPN IS GOOD FOR I
`
`up the Internet. Your major expenses are only the cost of that short loop that
`connects your office to the network access server (NAS) or POP of your Inter-
`net service provider (ISP) and your monthly Internet fee. The average price for
`a leased T1 (1.544 Mbps) connection is about $1,800. A typical connection
`from a company’s offices to the local ISP’s POP costs $400 to $500 a month,
`because the chances are you’ll actually use less than a full T1 line to your
`POP, perhaps even a 128 Kbps ISDN line or a digital subscriber line (DSL)
`of some sort at an even lower cost of $50 to $150 a month. If you’re a small op-
`eration, your cost may be a monthly subscription for a dial—in connection to
`your ISP.
`The savings can be considerable. According to a white paper by Infonetics
`Research, a study commissioned by Sun Microsystems estimated savings of
`from 20% to 47% by switching from leased lines to a VPN. In another analy-
`sis, Infonetics estimated savings of 20% to 40% for VPNs serving branch
`offices and 60% to 80% savings for a VPN serving remote access users. As
`we’ll see later on in this chapter, when we look at the remote access aspect of
`VPNs, every analysis of VPNs produces similar savings estimates. The experi-
`ences of VPN users bolster those findings, as we’ll see in Chapter 2.
`Another source, Data Communications magazine, in their May 21, 1997,
`issue, ran their own numbers on a VPN, comparing leased lines, a frame relay
`service (see Chapter 4), and an Internet-based VPN solution (Table 1-1). The
`sample scenario was to connect three sites in the United States (Boston, Los
`Angeles, and Houston), plus one, transatlantic link to London. All were con—
`nected at 64 Kbps. AT&T was the carrier and provided the charges, including
`local access circuits of 5 km to the nearest POP. Leased—line and frame relay
`figures were provided by Lynx Technologies, Inc. of Pairfield, New Jersey, a
`tariff tracking consultancy. Internet figures were based on average monthly
`ISP charges in the United States.
`As the Data Communications analysis shows, the frame relay first—year
`cost is only about 17% lower than the cost for leased lines, but about twice
`the first-year cost for the Internet VPN. However, much of the frame relay
`
`
`
`Frame relay
`Internet
`
`Leased line
`VPN
`VPN
`
`$89,998
`Annual charges
`$5,760
`Installation
`$16,000
`$16,000
`Four VPN encrypting devices
`$54,400
`$111,758
`$135,972
`Total cost, first year
`—-——-——————_—____
`
`$133,272
`$2,700
`
`$38,400
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`
`Page 14 of 46
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 14 of 46
`
`

`

` ,8,
`l
`l
`
`VIRTUAL PRIVATE NETWORKS
`
`first-year cost is the one—time charge for installation and the encryption de—
`vices. The annual charges (operating costs) are about two thirds of those for
`leased lines, though still more than double the annual charges for an Internet
`VPN.
`
`By this analysis, the Internet is obviously the most economical choice for
`your VPN, but for the extra operating expense of the frame relay choice you do
`get added services that are not available on the Internet, as we’ll discuss in
`Chapter 4. If you need those services, you’ll see that, as economical as the
`Internet is, it is not the best choice for you.
`-
`Because of the way telephone charges are computed,rthe greater the dis—
`tances and the larger your user base, the greater the savings you’ll enjoy. Tele-
`phone charges are computed by the call, and the rates increase with the mile-
`age covered. Distance means nothing to the Internet, and Internet service is
`usually billed at a flat rate, regardless of the number of times you use it or the
`amount of data transmitted. In Chapter 2 we’ll look at some real-life VPNs
`and see how the savings can stack up in action.
`
`1.2.2 Flexibility
`
`It is true, also, that a VPN offers flexibility that is not available to a leased-
`line—based wide area network. To add a node to the latter requires leasing a
`new line, possibly more than one, perhaps even installing some cable. Leases
`have to be negotiated, perhaps rights-of—way arranged. Routers and switches
`have to be installed and configured.
`Let’s go back to our first three-node leased-line network. Your company,
`Giant Widgets, has long done business with Associated Grommets, a supplier
`of grommets for your widgets. Your company is flush with cash, the widgets
`market has been really strong lately, and you decide to buy the grommets fac-
`tory. Once you’ve acquired it you want to put it on your existing network. Fig—
`ure 1-3 shows what happens when you have to bring it into the loop of a
`leased-line network. Three new lines have to be leased and somehow inte-
`grated into your existing system.
`-
`Now let's take the same scenario if you’re running an Internet-based VPN
`(Figure 1—4). You've purchased the grommets factory, and it just happens to al-
`ready have a link to the Internet. They’ve been selling grommets through the
`Internet for years, after all. All that’s needed is to slide into place the VPN sys-
`tem, generally a hardware box or some software, and they’re on your network.
`Or suppose that instead of buying the Associated Grommets factory you just
`want to extend your VPN to it, turning your VPN from an intranet into an
`extranet. The scenario is essentially the same.
`If you already have an Internet link on the facility you want to link to the
`VPN—for a Web site, for example, or email—getting your VPN up may be as
`
`
`
`
`
`
`
`
`
`
`
`Cisco Systems, Inc.
`Exhibit 1014
`
`Page 15 of 46
`
`Cisco Systems, Inc.
`Exhibit 1014
`Page 15 of 46
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`1.2 WHAT A VPN IS GOOD FOR -
`
`
`
` Branch office
`
`Branch office
`
`Ass

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket