Going to go against the flow here and say go for OpenVPN.

This recommendation is based on the following observations:

It's easy to implement
It's secure
It's stable
By using the tls-auth option the fact that your firewall is acting as a vpn endpoint becomes invisible to the 'net'
It easily handles NAT'ing firewalls with no special NAT requirements
Will easily work with dynamic DNS clients as end points.
Works well with OpenBSD

In your scenario you could setup a single central OpenVPN/CA server to act as a VPN concentrator your 2nd site and your two colo servers could then act as 'clients' making admin and setup very straight forward.

With regard to the speed of IPSec v OpenVPN (SSL/TLS), we use IPSec for site to site VPN's (3DES+PFS) where each end has a static IP and OpenVPN (Blowfish) for our 'road warriors'

The IPSec VPN's terminate onto a 3.8 box with a 450Mhz CPU (K62)
OpenVPN runs on a separate 3.8 box behind the firewall and uses a PII 450Mhz CPU

When comparing the two vpn solutions for speed, subjectively the OpenVPN feels slightly faster, but there's not much in it and the different encyption schemes may well account for the speed variance, we don't push a lot of traffic through the VPN's hence I can get away with low power hardware. However what I'm trying to say is that running OpenVPN doesn't require a large amount of horsepower and is no disadvantage over IPSec.

Regards

Simon

Reply via email to