Specifications
Network Requirements and Preparation
Planning and Installation Guide 9 – 21
Performance
From an IP VPN performance perspective, encryption is a CPU-intensive operation. As
a result, enterprises must evaluate VPN products in two primary areas as they relate to
encryption. The first is whether the maximum throughput decreases substantially
when encryption is used, and the second is whether a consistent throughput can be
maintained when encryption is enabled. Typically, the trade-off between performance
and price is debated from a software-based versus hardware-based encryption
perspective.
Integrated Security Appliances
A number of major vendors provide integrated broadband security appliances to
eliminate security concerns. These devices use custom ASICs to deliver wire-speed
firewall, Triple DES IPSec VPN, and traffic shaping in an easy-to-deploy, cost-effective
solution. Installing a NetScreen-5 eliminates the need to deal with complex PC
software installations and allows IT to centrally manage the security policies of these
remote offices and teleworkers. The firewall protection secures sensitive data at the
remote site and prevents both U-turn attacks and the launching of denial-of-service
attacks from these computers. By combining broadband access technologies with an
integrated security appliance, enterprises and service providers can safely and securely
capitalize on all of the benefits of the broadband Internet.










