Unit 3 VPNS, Intranets and Extranets
Unit 3 VPNS, Intranets and Extranets
Unit 3 VPNS, Intranets and Extranets
Both the business manager and the technical manager should find
interest in this new virtual networking scheme. The business manager
is usually interested in cost of ownership issues. Numerous studies from
organizations such as the Gartner Group and Forrester Research have
found that only 20 percent of networking costs are associated with
capital equipment acquisition. The other 80 percent of annual budgets
are dedicated to items such as wide area networking charges, personnel,
training, maintenance and vendor support, as well as the traditional
equipment moves, adds, and changes.
It is important for IS managers to remember that capital
expenditure happens in year one, even though the equipment may be
operating for another four years. Wide area network (WAN) charges
can account for up to 40 percent of an organization’s networking
budget. For every dollar that the technical staff spends on new
equipment, another four dollars is spent on the operation of that
equipment. Therefore, focus should be on the cost of ownership issues,
not necessarily the cost of the network devices.
3.1.2 Network Reliability
voice vpn
Transport Nets
· frame relay
· leased line
· ATM
Data
Voice Access (Similar
Access
Architecture)
Public
Headquarters Internet Headquarters
Access
Enterprise A Enterprise B
VPN Remote
T1/FT1, BRI, DDS56K
Mobile User The Internet ISP
ISP
ISP
ISP
Internet
T1/FT1, BRI, DDS56K Applications
Ledgen
PPTP
PC Print Server
Non-Encrypted
Traffic
Branch Office
Corporate Central Site
• IP router
• Web server
• firewall
• email
• file transfer (FTP)
• Domain Name Service (DNS)
• Dynamic Host Configuration Protocol (DHCP)
• remote management
Transit
Internetwork
Logical Equivalent
The facilities that connect the branch office and enterprise offices
to the Internet are local in both cases. To make a connection, both
client/server, and server/server VPN cost savings are largely predicated
on the use of a local access phone number. It is recommended that the
enterprise hub router that acts as a VPN server be connected to a local
ISP with a dedicated line. This VPN server must be listening 24 hours
per day for incoming VPN traffic.
3.3.6 Connecting Computers over an Intranet
Enterprise
Network
The remainder of this article discusses VPNs and the use of these
technologies by enterprises to do secure remote access (e.g., by traveling
employees and sales reps) over the Internet in greater detail.
3.4.2.1 Single Client. A single client is used for both the direct dial up
and virtual private network connections. Users utilize the same client
interface for secure transparent access, whether dialing directly to the
enterprise network or connecting via a VPN, by using Windows
integrated dialup net working technology (DUN) and Microsoft
Connection Manager. In fact, users do not need to concern themselves
with which method is employed.
3.4.2.2 Central Management. Central management is used for remote
dialup and VPN access phone numbers. According to Microsoft, its ITG
has found that one of the most common support problems traveling users
face is deter mining and managing local access phone numbers. This
problem translates into one of the principal reasons for support calls to
Microsoft’s user support centers. Using the Connection Manager
Administration Kit (CMAK) wizard (which is part of Microsoft’s
remote access solution), Microsoft’s ITG preloads each client PC with
an electronic phone book that includes every dialup remote access phone
number for Microsoft’s net work. The Windows solution also allows
phone books to be centrally integrated and managed from a single
remote location, and clients to be updated automatically.
TelcoResearch.6
Furthermore, Microsoft’s ITG is also able to generate detailed
reporting of remote access and VPN network use for internal cost
accounting purposes while using familiar Windows 2000 management
tools by using Telco Research’s product. In addition, Microsoft’s ITG is
able to quickly and easily deploy a turnkey reporting solution built on
the intrinsic communication services of Windows 2000 in this manner.
According to Microsoft, while maintaining the flexibility to
accommodate future change, they receive better security as a result,
reduced implementation costs, and enhanced reporting to improve
remote access management and charge back service.
• performance
• interoperability
• scalability
• flexibility
3.5.1 Performance
3.5.2 Interoperability
3.5.3 Scalability
• telephone lines
• terminating equipment
• long distance
• calling card
• 800/877 number support
Internal Protection
3.5.5.4 Training
• Syria
• Iran
• Iraq
• North Korea
• Libya
• Cuba
• Sudan
• Serbia
As one reads the list of countries, it is easy to determine why the United
States is reluctant to allow encrypted communications with these
countries. Past wars, conflict of interests, and terrorism are the primary
ingredients to become exiled by the United States.
Similar rosters exist for other countries that have the United States
listed as “unfriendly,” due to their perception of communication with the
United States.
As one can certainly see, the concept of encryption export and import
laws is vague, complex, and constantly in litigation. In the event a VPN
is required for international communication, it will be necessary to
obtain the latest information available to properly implement the
communication as per the current laws.
3.6 INTEGRATING DATA CENTERS WITH INTRANETS
The three transport technologies ensure that the still large installed
base of SNA devices and control units are able to communicate with
main frame or AS/400resident SNA/APPN applications across an
intranet using SNA on an end to end basis. Of the three, standards based
DLSw, which is available on nearly all major brands of bridge/routers, is
by far the most widely used and the most strategic. AnyNet, in marked
contrast, is not available on bridge/routers or within SNA devices such as
3174s, 4700s, etc. Consequently, it cannot be used easily as a universal
scheme for supporting any and all SNA devices and control units as can
DLSw. Thus, AnyNet is not as strategic or useful as DLSw. High
Performance Routing (HPR) is IBM’s follow on architecture to APPN
and SNA. HPRoverIP, now available on IBM 2216 and CS/NT, has
irrefutable advantages over DLSw: it can support native, data center to
data center SNA/APPN routing over TCP/IP; SNA LU 6.2 Class of
Service (COS)based path selection; and traffic prioritization. If and
when this technology is more readily available, corporations that require
SNA/APPN routing to obtain optimum traffic routing in multi data
center networks, or those that have LU 6.2based applications that rely
on COS, may want to consider HPRoverIP as an alternative to DLSw.
DLSw’s ability to support any and all types of SNA/APPN traffic
effortlessly could be easily abused when trying to integrate intranets
with data centers. DLSw could be used all by itself to realize the
integration by grafting the existing SNA/APPN network, totally
unchanged, onto the intranet through the extensive deployment of DLSw
all around the periphery of the intranet. This brute force, “no SNA
reengineering whatsoever” approach has been used in the past to
integrate SNA networks into TCP/IP networks. With this type of DLSw
only network you would find SNALAN gateways being used
downstream of the intranet, and then DLSw being used to trans port the
SNA output of these gateways across the intranet. While such net works
indubitably work, there are other strategic techniques such as a
3270toHTML and applet based 3270/5250 emulation that should typically
be used in conjunction with DLSw to achieve the necessary integration.
Figure summarizes how the various SNA Transport and SNA Access
integration techniques can be gainfully synthesized to integrate data
centers with intranets.
Outside Network
Co. Net
Router
A B
Extranet
Outside Network
Co. Net
A Router
Extranet
A
Fire B
wall
Extranet
Proxy
A
Fire-
wall
to the Internet is stripped of the user’s original internal address, and only
the external gateway address of the enterprise is seen on the packet as it
traverses the Internet. Figure depicts these proxy functions.
The proxy provides both security and network address
functions, although the entire process can be used in its reverse to
provide an extranet architecture because of its ability to provide access
rules over who can use the proxy, where these proxy users are allowed
to go, and what resources they can access. Figure depicts a reverse
proxy extranet architecture.
Today, most proxies are set up for HTTP or HTTPS access,
although application layer gateway proxies exist for most popular
Internet access services (Telnet, FTP, SQL, etc.). One of the major
issues with proxy servers, however, is the amount of cycle time or
machine overhead it takes to manage many concurrent proxy sessions
through a single gateway. With highly scalable hardware and optimized
proxy software, it can be carried
Proxy
A Router
Fire-
wall
Co. Net
Outside Network
ENCRYPTION
www
VPN
Server
VPN
Client
Traffic patterns for multi homed intranet with a single VPN gateway
and an external VPN client.