Remote ethernet devices

Anyone familiar with the use of "remote ethernet devices" that can securely connect branch offices over the public cloud?  There is a product from Sophos Network Security call Astaro Remote Ethernet Devices that are plug and play boxes that you power up at your remote offices and automatically connect up to your private WAN to all other branches with the same box.  Almost like subscribing to MPLS or private VPN service.
My business partners are all wanting to move their business to the public cloud (Amazon, Terremark, etc...) Anyone with experience using these products and/or similar products?
For the Remote Ethernet Devices, I would be most interested in a VM version so that it can be launced in the cloud.
mrkentAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Dirk KotteSECommented:
the astaro/sophos RED simply creates a layer2 VPN Tunnel to another location.
but it is not available as virtual appliance.
but you can use the virtual UTM Appliance (Firewall) to build a VPN to amazon.
thats supported...
"This feature has been released in Version 8.300 of ASG and is now available! You may locate ASG Amazon Machine Images by searching “ASG” from the community tab of the AMI marketplace in Amazon Web Services"
mrkentAuthor Commented:
"to build a VPN to amazon"   What do you mean?  VPN from where to where?  And what device to what device?
Dirk KotteSECommented:
you can use ASTARO/SOPHOS VPX to build a S2S VNP from your office to your virtual computing environment at the Amazon cloud.

http://aws.amazon.com/en/ec2/#functionality

ASL can build IPSec VPN's to nearly any other device.
Big Business Goals? Which KPIs Will Help You

The most successful MSPs rely on metrics – known as key performance indicators (KPIs) – for making informed decisions that help their businesses thrive, rather than just survive. This eBook provides an overview of the most important KPIs used by top MSPs.

mrkentAuthor Commented:
In your initial post, when you said the RED creates a layer 2 VPN to another location:  1. Since it connect thrus the internet, how does it get thru since it must have layer 3?  IPSEC? 2. Does the other location have to be another Astaro Red?

ASL? Is that another abbreviation or typo?
Being able to build IPSEC VPN to nearly any other device, I'm trying to determine why it would be better than any other VPN termination product like the Cisco 871 for example.

With IPSEC is the key exchange via pre-shared keying?

Thanks for the info
Dirk KotteSECommented:
Update:
The devices - at one Side Sophos UTM (or AstaroSecureLinux == ASL/AstaroSecureGateway == ASG/ ... thats all the same) and Astaro RED at the other side creates a VPN using Layer 3. But within the tunnel they transmit Layer2 data.

With SophosUTM at booth sides you can transmit L2 or L3 data through the tunnel.

The VPN are not better than using Cisco Router/ASA or other Device, but the management is much more simple.

With SophosUTM (ASL/ASG) you can use PSK and Certificates.      

The new version are very nice. take a look.
mrkentAuthor Commented:
So it looks like SophosUTM to SophosUTM is the best option for me because I am most interested in transmitting L3 data thru the tunnel.

Thanks for the update.
Dirk KotteSECommented:
VPN SophosUTM to SophosUTM is a simple to manage solution.
You can try it for free.
Take 2 PC's with >=2 NIC's 1-2 GB RAM and install the free software.
you need the network-security subscription (or a 30 day demo license).
i can create the demo-lic for you.
If you are happy with the solution, you can buy the  network-security subscription and also 1-2 appliances.
all configurations made while testing are reusable.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
mrkentAuthor Commented:
Thanks for the offer to get the demo-lic
I had already recently purchased three hardware RED appliances and an ASG Virtual hub (Essential Firewall/Net security/Web security product) for 10 users.  I had the virtual hub installed in Amazon, an AWS instance.  And I mapped the hardware appliances to each other via that hub.  Giving a hub and spoke topology.
But I really like the idea of connecting two virtual hubs together and passing tunneled L3 traffic between them.
Do you think I need to purchase another virtual ASG virtual hub for this or can I get a demo license and try it out -in other words get another demo virtual hub in the Amazon (or another cloud provider, I'm married to Amazon) cloud?
Dirk KotteSECommented:
sorry,
i am not aware about other cloud providers using (virtual) ASG.
also i don't know nothing about AWS Pricing.
If you can create another virtual ASG virtual hub and only missing the license, you can use a demo key.
mrkentAuthor Commented:
That's all I need to know.  If I can create another "test" hub on my own AWS with a demo key for the second ASG virtual hub, then I'm all set and can try it out.
Thanks!
Dirk KotteSECommented:
solved?
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Cloud Computing

From novice to tech pro — start learning today.