<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: network planning in Communications and Wireless</title>
    <link>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193618#M2402</link>
    <description>I agree with Jerome regarding entry level routers but the new 3Com routers are worth looking at, some better features than Cisco, cheaper and easier to set up.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;&lt;BR /&gt;Keith&lt;BR /&gt;</description>
    <pubDate>Wed, 18 Feb 2004 03:13:26 GMT</pubDate>
    <dc:creator>Keith_62</dc:creator>
    <dc:date>2004-02-18T03:13:26Z</dc:date>
    <item>
      <title>network planning</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193616#M2400</link>
      <description>I am planning to connect 2 office togather through VPN, is there any good VPN router to recommend? Is there any router have firewall, proxy as well as VPN function?</description>
      <pubDate>Mon, 16 Feb 2004 23:35:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193616#M2400</guid>
      <dc:creator>Yong Shiuh Rong</dc:creator>
      <dc:date>2004-02-16T23:35:14Z</dc:date>
    </item>
    <item>
      <title>Re: network planning</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193617#M2401</link>
      <description>Depends on your link... dsl ? ATM ? Frame relay ? One ethernet connection indisde ? Price restrictions ?&lt;BR /&gt;Linksys offers fair entry level models, cisco is good for sure, but more expensive...&lt;BR /&gt;&lt;BR /&gt;J</description>
      <pubDate>Tue, 17 Feb 2004 07:24:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193617#M2401</guid>
      <dc:creator>Jerome Henry</dc:creator>
      <dc:date>2004-02-17T07:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: network planning</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193618#M2402</link>
      <description>I agree with Jerome regarding entry level routers but the new 3Com routers are worth looking at, some better features than Cisco, cheaper and easier to set up.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;&lt;BR /&gt;Keith&lt;BR /&gt;</description>
      <pubDate>Wed, 18 Feb 2004 03:13:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193618#M2402</guid>
      <dc:creator>Keith_62</dc:creator>
      <dc:date>2004-02-18T03:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: network planning</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193619#M2403</link>
      <description>Thanks for the recommendation, I will be using ADSL, I would like to say security is a much concern.&lt;BR /&gt;&lt;BR /&gt;I am looking at watchguard, netscreen, enterasys, top layer at the moment.</description>
      <pubDate>Wed, 18 Feb 2004 03:17:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193619#M2403</guid>
      <dc:creator>Yong Shiuh Rong</dc:creator>
      <dc:date>2004-02-18T03:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: network planning</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193620#M2404</link>
      <description>We've had good results with some Sonicwall products: &lt;A href="http://www.sonicwall.com/" target="_blank"&gt;http://www.sonicwall.com/&lt;/A&gt;</description>
      <pubDate>Wed, 18 Feb 2004 07:40:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193620#M2404</guid>
      <dc:creator>seymour999</dc:creator>
      <dc:date>2004-02-18T07:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: network planning</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193621#M2405</link>
      <description>Hi Yong Shiuh Rong,&lt;BR /&gt;&lt;BR /&gt;What's your budget for a firewall/vpn solution?  A few other questions would be how many IP addresses are behind each of the firewalls?  How many public IP addresses will each office have (NAT)?  What kind of encryption do you intend to use?  DES? 3DES? AES? AES256?&lt;BR /&gt;&lt;BR /&gt;Appliance solutions like Sonicwall, Watchguard and Netscreen are great for wirespeed performance.  They also do not charge per IP address like Checkpoint do.  Netscreen has gained a lot of traction in the last 2 years so that says a lot about their products.  Also, watch out for the annual subscription that you have to pay for software upgrades or support.  That affects your TCO.&lt;BR /&gt;&lt;BR /&gt;I do not like cisco PIX coz it's so complicated to configure them.  Take a look at &lt;A href="http://www.astaro.com" target="_blank"&gt;www.astaro.com&lt;/A&gt; and &lt;A href="http://www.sofaware.com" target="_blank"&gt;www.sofaware.com&lt;/A&gt; as well.&lt;BR /&gt;&lt;BR /&gt;The cool thing about Sofaware is it uses Checkpoint's code, i.e. their Inspect (tm) engine.  It allows you to perform gateway level content filtering and viral inspection.  Good luck!</description>
      <pubDate>Thu, 19 Feb 2004 00:44:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193621#M2405</guid>
      <dc:creator>Stuart Teo</dc:creator>
      <dc:date>2004-02-19T00:44:44Z</dc:date>
    </item>
    <item>
      <title>Re: network planning</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193622#M2406</link>
      <description>Hi,&lt;BR /&gt;Among your selection I would consider watchguard, fair prices and good performance. Netscreen is pretty efficient too, but expensive and, as far as I see it, too proprietary in their OS implementation. I like simple and easy to use interfaces, not full of hidden corridors... or I buy a ciso, undoubtedly herder to set up, but strong...&lt;BR /&gt;&lt;BR /&gt;Course your budget and  Hwee Liang Teo's questions on encryption and NAT would help choosing a precise model...&lt;BR /&gt;&lt;BR /&gt;J</description>
      <pubDate>Thu, 19 Feb 2004 01:45:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193622#M2406</guid>
      <dc:creator>Jerome Henry</dc:creator>
      <dc:date>2004-02-19T01:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: network planning</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193623#M2407</link>
      <description>Hwee Liang, I never know there are so many encryption. I plan to subscibe 1 public for the branch and upgrade my HQ to five IP package. &lt;BR /&gt;&lt;BR /&gt;There are still a lot I need to look at and listening to.</description>
      <pubDate>Thu, 19 Feb 2004 01:48:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193623#M2407</guid>
      <dc:creator>Yong Shiuh Rong</dc:creator>
      <dc:date>2004-02-19T01:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: network planning</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193624#M2408</link>
      <description>Where can I get the better understanding of all the encryption technology?</description>
      <pubDate>Thu, 19 Feb 2004 02:45:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193624#M2408</guid>
      <dc:creator>Yong Shiuh Rong</dc:creator>
      <dc:date>2004-02-19T02:45:49Z</dc:date>
    </item>
    <item>
      <title>Re: network planning</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193625#M2409</link>
      <description>Google does a good job in bringing up good articles on this subject.  Some keywords that might interest you are&lt;BR /&gt;&lt;BR /&gt;Diffie-Hellman (DH)&lt;BR /&gt;&lt;BR /&gt;Internet Key Exchange (IKE) &lt;BR /&gt;&lt;BR /&gt;Encapsulating Security Payload (ESP)&lt;BR /&gt;&lt;BR /&gt;IP payload compression (IPcomp)&lt;BR /&gt;&lt;BR /&gt;Authentication Header (AH)&lt;BR /&gt;&lt;BR /&gt;Rijndael (AES)&lt;BR /&gt;&lt;BR /&gt;Data Encryption Standard (DES)&lt;BR /&gt;&lt;BR /&gt;There are many ways you can create an ipsec vpn tunnel. You may want to ensure that packets were not modified but not be concerned about encrypting the payload (AH).  Or you may be paranoid enough to want to encrypt the payload.  You may also be paranoid about uncle sam decrypting your payload and want to avoid DES.  But honestly, the private key is changed so ever frequently in an ipsec tunnel that one has has to question the sanity of worrying about uncle sam.&lt;BR /&gt;&lt;BR /&gt;AES is popular because (amongst many other reason) it is faster to crunch than DES.  Of course a lot of people believe that TwoFish is more secure than DES and AES.&lt;BR /&gt;&lt;BR /&gt;A note on purchasing appliances. Since they do not liberally expose the cpu specs, you want to look at the vpn/ipsec throughput specs.  e.g. 10 mbps if using DH &amp;amp; AES may mean 2 mpbs if using DH &amp;amp; DES.</description>
      <pubDate>Mon, 23 Feb 2004 16:15:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193625#M2409</guid>
      <dc:creator>Stuart Teo</dc:creator>
      <dc:date>2004-02-23T16:15:53Z</dc:date>
    </item>
    <item>
      <title>Re: network planning</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193626#M2410</link>
      <description>What do you interconnect ? 2 offices ? Through internet ? Then 2 good solutions for your VPN are L2TP and PPTP, the first being the better.&lt;BR /&gt;ON them, the question is how do you encrypt your datas (which algorythm). If this is not your hobby, don't bother to get algorythm differences. They are based on mathematic concepts that are not your main point. Trust your vendor on that.&lt;BR /&gt;Today, AES is considered as fairly secure, replacing DES and Diffie Helman, secure but harder to set up as far as the protocol and algorythm implications are concerned. You can encrypt header (to make sure it's not altered, it's called AH) or the full paquet to prevent its reading by a middle man, it's called ESP. Exchanging encryption keys goes thruogh a protocol called IKE&lt;BR /&gt;Encryption is a very wide part of the security technology, if you have time and need pointers, just let us know... and make some coffee !&lt;BR /&gt;&lt;BR /&gt;hth&lt;BR /&gt;&lt;BR /&gt;J</description>
      <pubDate>Tue, 24 Feb 2004 04:03:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193626#M2410</guid>
      <dc:creator>Jerome Henry</dc:creator>
      <dc:date>2004-02-24T04:03:55Z</dc:date>
    </item>
    <item>
      <title>Re: network planning</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193627#M2411</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;AES does not replace Diffie Hellman.  DH is the public key exchange method used to secure a channel for (symmetric algorithm) private key exchanges.  Thought I'd just clarify on that point.  But like the above post said, ignore all these garble if you're not transmitting top secret data &amp;amp; go for the coffee instead.  ;)&lt;BR /&gt;&lt;BR /&gt;Side-note: your reseller might not sell you L2TP or PPTP or MPPE because it may not make them money. And it is also true that PPTP isn't secure enough.  L2TP...mmm...ok.  MPPE is a big improvement over L2TP.</description>
      <pubDate>Tue, 24 Feb 2004 13:05:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193627#M2411</guid>
      <dc:creator>Stuart Teo</dc:creator>
      <dc:date>2004-02-24T13:05:58Z</dc:date>
    </item>
    <item>
      <title>Re: network planning</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193628#M2412</link>
      <description>Thank you for all the information, I am a novice user since. I think I will go for the mid range VPN router firewall.</description>
      <pubDate>Tue, 24 Feb 2004 20:36:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/network-planning/m-p/3193628#M2412</guid>
      <dc:creator>Yong Shiuh Rong</dc:creator>
      <dc:date>2004-02-24T20:36:45Z</dc:date>
    </item>
  </channel>
</rss>

