Skip to Content

VPNs Connect Offices, Users, and Partners

With SSL and IPsec virtual private networks (VPNs), businesses can securely connect remote offices and remote users using cost-effective, third-party Internet access rather than expensive dedicated WAN links or long-distance remote dial links.

Organizations can reduce WAN bandwidth costs while increasing connectivity speeds by using high-bandwidth Internet connectivity, such as DSL, Ethernet, and cable, and securing it with encrypted IPsec or SSL VPN tunnels.

VPNs provide the highest possible level of security through encryption and authentication technologies that protect data traversing the VPN from unauthorized access. Organizations can take advantage of the easy-to-provision Internet infrastructure to quickly add new sites or users, and can dramatically increase the reach of their networks without significantly expanding infrastructure.

VPNs Extend Security for Remote Users

SSL and IPsec VPNs have become the primary solution for connecting remote offices, remote users, and business partners, because they:

  • Provide secure communications with access rights tailored to individual users, such as employees, contractors, or partners
  • Enhance productivity by extending corporate network and applications
  • Reduce communications costs and increases flexibility

The two types of encrypted VPNs are:

  • Site-to-Site IPsec VPN: This alternative to Frame Relay or leased-line WANs allows businesses to extend network resources to branch offices, home offices, and business partner sites.
  • Remote-Access VPN: This extends almost any data, voice, or video application to the remote desktop, emulating the main office desktop. Remote-access VPNs may be deployed using SSL VPN, IPsec or both, depending on deployment requirements.

Cisco Systems

Why Choose Cisco - The Value of a Systems Approach

A systems approach begins with a single, resilient platform such as the Cisco integrated services routers. A systems approach combines packaging with intelligent services within and between services, and weaves voice, security, routing, and application services together, so that processes become more automated and more intelligent. The results are pervasive security in the network and applications; higher QoS for data, voice, and video traffic; increased time to productivity; and better use of network resources.