Monday, May 6, 2013

NetworkEducator.com - Networking Articles, Tips, Resources, Configuration

NetworkEducator.com - Networking Articles, Tips, Resources, Configuration


Understanding Internet

Posted: 06 May 2013 03:30 AM PDT

The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.  No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set [...]

The post Understanding Internet appeared first on Network Educator.

Friday, May 3, 2013

NetworkEducator.com - Networking Articles, Tips, Resources, Configuration

NetworkEducator.com - Networking Articles, Tips, Resources, Configuration


Categories in VPN

Posted: 03 May 2013 02:58 AM PDT

There are three basic VPN categories that describe where a VPN is used.

  • Intranet
  • Extranet
  • Internet

Intranet  -  A VPN connection between same companies.  Transport mode connections within a company’s infrastructure, such as VPN between two devices (a router sending traffic to a sys log server, a PIX appliance backing up its configuration to a TFTP server, and a user on a PC using Telnet to a Catalyst 3550 switch, to name a few).  Tunnel mode connections between different locations within a company’s infrastructure, such as VPN between two offices via a private Frame Relay or ATM network

Extranet -  A VPN connection from one company to another company, such as a business partner. An example of an extranet could be a company that has outsourced its help desk functions and sets up a VPN to provide a secure connection from its corporate office to the outsourcing company.

Internet  -  An Internet VPN uses a public network as the backbone to transport VPN traffic between devices. As an example, you might use the Internet, which is a public network, to connect two sites together (L2L connection), or have telecommuters use their local ISPs to set up a VPN connection to the corporate network (remote access connections).

vpn categoriesVPN Tunnelling

Tunneling is the most significant component of VPN technology.   Tunneling is the technique of encapsulating an entire data packet in the packet of another protocol format. When a tunneled packet is routed to the destination node, it travels across the internet work through a logical path. This logical path is referred to as a tunnel.  Tunneling is analogous to sending a letter. After you write a letter, you place it in an envelope. This envelope displays the address of the recipient. When you post this letter, it is delivered to the recipient according to the address on the envelope. The recipient then needs to open the envelope to read the letter. In tunneling technology, the letter is equivalent to the original payload and the envelope represents the packet of the routable protocol in which the payload is encapsulated. The address on the envelope represents the routing information that is appended to the packet.

The post Categories in VPN appeared first on Network Educator.

Thursday, May 2, 2013

NetworkEducator.com - Networking Articles, Tips, Resources, Configuration

NetworkEducator.com - Networking Articles, Tips, Resources, Configuration


Site To Site VPN

Posted: 02 May 2013 03:30 AM PDT

A site-to-site VPN uses a tunnel mode connection between VPN gateways to protect traffic between two or more sites or locations.  Site-to-site connections are commonly referred to as LAN-to-LAN (L2L) connections.

site to site vpnSimple Site-to-Site Design Scenario

Above figure show an example of site to site VPN, We can deploy IPSEC tunnel between router else between concentrator. Its up to administrator who comes on these conclusion by router is lower end or higher end, who will be responsible for NAT, if pix will be responsible for NAT in this feature concentrator must support the feature IPSEC NAT- Traversal feature (IPSEC NAT-T).
 

Hub-and-Spoke Networks and Site-to-Site VPN

site to site vpn

Above figure is an example of HUB-SPOKE site to site VPN.

 

 site2site1b

Example of Corporate Extranet and Site-to-Site VPN

Site-to-site VPN deployments are also popular in corporate extranets. When an organization requires dedicated site-to-site connectivity to a peer organization or subsidiary, often, a dedicated, high-speed WAN circuit is provisioned

The post Site To Site VPN appeared first on Network Educator.

Wednesday, May 1, 2013

NetworkEducator.com - Networking Articles, Tips, Resources, Configuration

NetworkEducator.com - Networking Articles, Tips, Resources, Configuration


Which VPN solution should we choose ?

Posted: 01 May 2013 03:30 AM PDT

Which VPN Solution should we choose ?

 Before choosing correct VPN solution for our network, we need to ask below question to us.

  • What do I need to protect?
  • What kind of protection is required?
  • How much protection is needed?

vpn solution

First need to determine what is to be protected. Do I need to protect traffic for specific applications, such as e-mail, database access, file transfers, and others? Do I need to protect traffic for specific hosts? Do I need to protect traffic for specific network segments? If I only need to protect traffic for specific applications, I would probably first examine SSL VPN to see if there is a solution available for the particular application or applications that need to be protected. Otherwise, I would look at other VPN solution

Second, what kind of protection is necessary? Does the traffic need to be encrypted? Do I need to perform packet integrity checking? How important is it to verify a device’s identity? Once I’ve answered these questions, I can narrow in on a more specific VPN solution. For instance, if I need encryption, I can immediately rule out GRE.

vpn solutionAnd third, how much protection is needed? For example, if I require encryption to provide data confidentiality, how strong does the encryption process need to be? Can I use DES or must I use a much stronger encryption algorithm, like 3DES? For device authentication, can I use pre-shared keys or should I use digital certificates? Again, I use these questions to narrow my pick to the most appropriate VPN solution.

There are many services being offered by the ISP providers. These include Site-to-site VPN, VPN on dial up networks, VPN on broadband networks, Voice with VPN and VPN on ISDN services

The post Which VPN solution should we choose ? appeared first on Network Educator.