You are using FAT APs. How many APs are you planning on deploying? FAT APs are great if you have a small setup. But once you start exceeding a couple of hundred APs they tend to become a management nightmare just for channel assignment and basic configurations. Yes. You can always construct a highway with enough lanes and expansion is always a possibility. My point was more along the lines of where you want your entrances, exits and tolls on your highway. By properly selecting those strategic points the cost of expansion may be avoided unless absolutely necessary. 2500 connections is a pretty large amount of connections to handle. But wireless is expanding very fast. It starts as a luxury that turns into a commodity right before your very eyes.

JB

Foggi, Nicola wrote:

We are only using "FAT" AP's so we're not concerned with the controller based problem of conectrating the traffic, but as for the terminations on the VPN box, it's of course always a concern, however, you obviously need to buy a scalable system. Many of the systems these days (at least enterprise ones) will cluster to allow thousands of simulanteous users. It's same same problem if you are running a traditional IPSEC VPN, how many users do you want to put on one box.

In our scenario we are planning 1000 simultaneous users, the boxes we are looking at support around 2500 simultaneous on one box and if you cluster a second one in there 5000. I don't have that many users to actually know how well it works, but I don't think I'll exceed 2000 in the next couple of years...

Nicola

-----Original Message-----
From: Jorge Bodden [mailto:[EMAIL PROTECTED]
Sent: Wed 6/14/2006 8:48 AM
To: [email protected]
Subject: Re: [WIRELESS-LAN] SSL VPN over wireless

Stephen,

SSL vpn is used for remote users logging in to your network remotely. Although it could solve some of your problems on the remote access side
as well as your wireless network side, it might not be the right
solution if you have a big enough network.  I assume that the vpn
portion of of SSL stays the same in that all vpn traffic has to end up
at the vpn concentrator(s) at some point or another due to the fact that
the encryption will take place between the client and concentrator.  (I
might be mistaken here on this since I do not work with the VPN
concentrator so much).

Using 802.1X the authentication will go from client to AP to Radius to
Authentication mechanism (LDAP, AD, etc) all of which are the same as
VPN.  Once the authentication takes place the traffic will no longer go
to the concentrators for encryption purposes, which eliminates the
chance of a potential bottleneck at the concentrator.  The encryption
now takes place between the AP and the client.  You might still have the
potential for a bottleneck at the controller if you are implementing LightWeight AP Protocol (lwapp) because then all your traffic now has to
go to the controllers.  Although this solution might add overhead, but
one device will control traffic for internal users, while another
controls traffic for external users.

Please keep in mind that this solution is more scalable for larger
networks.  If your network is small enough you should be able to get
away with SSL VPN.

Thanks.

Jorge Bodden

Stephen Holland wrote:
> I would like to know if anybody is using SSL vpn as an
> authentication/encryption mechanism for wireless and how successful they
> have been deploying it.
>
> Also, I would be curious to know what other folks think about implementing
> 802.1x.  Specifically do you believe this is something that will be
> required in the next couple of years to support evolving technology like
> VoIP phones?.
>
> I'm trying to decide if I should deploy an SSL vpn solution  without
> deploying 802.1x. My instinct tells me to plan for 802.1x but I would be
> curious to hear what others think.
>
> Thanks
>
> Stephen Holland
> Network Engineer
> Northeastern University
>
> **********
> Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. >



--------------------

This electronic message is intended to be for the use only of the named recipient, and may contain information that is confidential or privileged. If you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution or use of the contents of this message is strictly prohibited. If you have received this message in error or are not the named recipient, please notify us immediately by contacting the sender at the electronic mail address noted above, and delete and destroy all copies of this message. Thank you.

**********
Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.


********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.




--------------------

This electronic message is intended to be for the use only of the named 
recipient, and may contain information that is confidential or privileged.  If 
you are not the intended recipient, you are hereby notified that any 
disclosure, copying, distribution or use of the contents of this message is 
strictly prohibited.  If you have received this message in error or are not the 
named recipient, please notify us immediately by contacting the sender at the 
electronic mail address noted above, and delete and destroy all copies of this 
message.  Thank you.

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to