Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Cisco Secures, Supercharges ISR G2s With Hardware-Accelerated VPNs

Customers looking for more performance and security in their branch operations should find the plug-and-play Cisco VPN Internal Service Module (VPN ISM) for the Integrated Services Routers Generation 2 (ISR G2) family very attractive, especially for the public sector, say company officials. The compact VPN blade provides up to three times better throughput for IPSec VPN encrypted traffic (1.2 Gbps), as well as support for the latest encryption standards. These include stronger National Security Agency-regulated encryption algorithms such as Suite-B, which has been selected for use by the U.S. government.

First announced by the NSA in 2005, Suite B cryptography is built on the Advanced Encryption Standard (AES) with 256-bit keys and Elliptic Curve Public Key Cryptography using the 384-bit prime modulus elliptic curve as specified in FIPS PUB 186-3 and SHA-384, and includes cryptographic algorithms for key exchange, digital signatures and hashing (Suite B Implementers' Guide to FIPS 186-3 (ECDSA), February 2010). Cisco says Suite B is pretty much restricted to government customers, but SHA-2 appeals to the commercial market, with growing interest from service providers. The company says the next-generation encryption (NGE) technologies are required because existing methods like RSA signatures and DH key exchange are increasingly inefficient as security levels rise, and CBC encryption performs poorly at high data rates.

Provided the module performs as advertised, it should enable Cisco to increase its market share in both the federal and enterprise markets, says networking analyst Nick Lippis, Lippis Enterprises. "The barrier of entry into branch office networking just got higher with this addition to the ISR G2. Cisco holds its lead and picks up some share."

In a report on the new offering, Lippis says that the ISR G2’s routing security portfolio is second to none, literally, and Cisco’s 70.3% market share is indicative of the market’s acceptance of this fact. "The previous G1 ISR was equipped with a VPN accelerator module, and many Cisco customers have been waiting for the same on the newer G2 platform. They need not wait any longer."

Suite B support is essential for being part of the U.S. federal government network, he says. "As Cisco’s VPN ISM supports Suite B in hardware, it’s highly likely that it’s the fastest implementation in the industry for IPSec applications, but this needs to be verified via independent lab performance test. Cisco claims that its VPN ISM support of Suite B is three to five times faster than its previous implementation."

See more on this topic by subscribing to Network Computing Pro Reports Security That Never Sleeps (subscription required).


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

WAN Security Reports

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers