Feeds

HP talks networks

Close to the Edge

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

HP is looking to grow its share in the networking market by reducing the complexity associated with network rollouts.

Last month HP introduced its ProCurve Network Adaptive Edge Architecture as a framework designed to deliver control at the edge of a network. The architecture is designed to make it simpler for users to manage complex applications, such as mobility, security and voice/data convergence.

Historically, the brains of networks have been located at the network core. But deferring security and traffic management to the core increases cost and complexity, HP argues. The approach also leaves networks exposed to security risks between the points where access is made and where authorisation is granted.

A better, and more scalable approach is to build intelligence into access devices, leaving core networks to manage aggregation and traffic routing.

At a pan-European conference in Barcelona this week, HP execs outlined their approach to the networking market.

HP, a strong number three in the switching market behind Cisco and 3Com, is targeting enterprise users for further growth. Its strategy is solid, if somewhat unexciting, just like its products.

John McHugh, VP and general manager of HP's ProCurve Networking Business, told journalists HP was trying to remove the black-arts reputation still sometimes associated with networking.

In moving from the "esoteric to the mainstream" HP is taking a similar approach to networking it previously applied to printing.

That means making networking more reliable and secure. It doesn't mean, however, that HP wants to see networking commoditised.

Perish the thought.

McHugh told us that technological advancements will prevent commoditisation of the market for the near future, despite the entry of Dell into the networking market.

Here HP is talking about innovations such as iSCSI, which might allow storage to be run over Gigabit Ethernet rather than more complex Fibre-Channel networks, roaming between wireless LAN and telco networks (still three-five years away, according to McHugh) and Gigabit Ethernet to the desktop.

But few applications need Gigabit Ethernet to the desktop and HP's enthusiasm for iSCSI is cautious.

"The softness in the storage market has dampened enthusiasm in iSCSI," McHugh told us.

Softly, softly catchee BOFH

That answer is symptomatic of HP's conservative approach to the networking market, which is not necessarily a bad thing.

HP doesn't plan to introduce 802.11g wireless networking kit until the high-speed 2.4GHz wireless networking standard is ratified this summer, thus sparing customers the potential grief non-compliant kit may bring. HP isn't firmly committed to either 802.11g or 5Ghz 802.11a kit for the future of wireless LAN deployments, McHugh told us.

On wireless LAN security, HP is a firm backer of 802.1X port-based access controls. The 802.1X standard provides for dynamic changes in WEP keys.

Many vendors back VPNs as a means to keep secure wireless data. Techies running a demo on wireless networking security argued that VPNs introduce a performance overhead. Using 802.1X will guard similarly against the perils of war driving while making it easier for users to use the same log-in system (based on Radius servers) when connecting via fixed or wireless networks, they argued.

HP is extending its architecture, which is similar in many respects to Cisco's AVVID framework, via firmware upgrades to its networking kit.

For example, earlier this month provided a software upgrade to its ProCurve Switch 5300xl series to introduce support for access control lists (ACLs). This allows access control between different VPNs via Layer 3 and 4 filtering. Previously HP introduced Layer 3 (routing) firmware upgrades to its Layer 2 switches, such as the ProCurve 4100, 2650 and 6108 series.

These are useful, though hardly exciting, innovations. Much like HP's networking strategy in general then. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ellison: Sparc M7 is Oracle's most important silicon EVER
'Acceleration engines' key to performance, security, Larry says
Linux? Bah! Red Hat has its eye on the CLOUD – and it wants to own it
CEO says it will be 'undisputed leader' in enterprise cloud tech
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.