Q: My current LAN contains VPNs at various locations throughout the enterprise. Why does our wireless infrastructure need to incorporate additional VPN functionality? – Adam, Rancho Santa Margarita, Calif.A: Conventional VPN architectures were designed to provide secure remote access. To that end, they are expected to be deployed at the edge of the network and support a limited number of users simultaneously. While this approach has proven effective for small wireless deployments (with wireless platforms supporting pass-through VPNs), it will not scale for significant wireless enterprise networks for several reasons:• Using existing VPN technology to support wireless users places additional strain on VPN concentrators. In most instances, they were not designed to handle hundreds to thousands of simultaneous network users.• VPN concentrators are often physically located at the edge of a corporate network. Backbone congestion could easily become a problem as IPsec traffic is required to traverse the corporate network on its way to an edge concentrator. • Client administration becomes more burdensome as each individual corporate user requires VPN software for the wireless network and the remote access network.• When VPN traffic is backhauled to an edge contractor, a delay exists that can cause ill-fated timeouts or require constant re-authentication. In addition to being a nuisance, this could prevent the deployment of time-sensitive applications, such as voice, video, and real-time data. Some wireless systems resolve these issues by terminating VPN sessions directly within the wireless network. This enables distinct VPN infrastructures to be deployed for wireless and remote access. IPsec traffic no longer has to be backhauled to the edge of the network, ensuring maximum network performance (i.e. less congestion and reduced latency), with minimal effort. In addition, some systems can maintain performance with the new security protocols, such as WPA and AES, which require specialized hardware acceleration to run effectively. These platforms use dedicated hardware throughout the system – not only to accelerate security at Layer 2, but to ensure the delivery of time-sensitive applications such as VoIP, multicast and video.Unlike traditional VPN approaches, a mobile VPN system lets users roam within a network – even across subnets – and still maintain VPN connectivity. This ensures maximum network flexibility and meets wireless user requirements. Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe