VPN DCN - Project
VPN DCN - Project
Hence VPN system is combination of all the above three aspects of networking.
Using VPN connectivity Client can access directly to all remote location same
as they would have accessed it while physically present there.
INTRODUCTION TO VPN
The World has changed a lot in the last couple of decades. Instead of
simply dealing with local or regional concerns, many businesses now have
to think about global markets and logistics. Many companies have
facilities spread out across the country or around the world, and there is
one thing that all of them need: A way to maintain fast, secure and reliable
communication wherever their offices are.
Basically, a VPN is a private network that uses a public network (usually the
Internet) to connect remote sites or users together. Instead of using a dedicated,
real-world connection such as leased line, a VPN uses "virtual" connections
routed through the Internet from the company's private network to the remote
site or employee. In this article, you will gain a fundamental understanding of
VPNs, and learn about basic VPN components, technologies, tunneling and
security.
WHAT MAKES A VPN ?
• Security
• Reliability
• Scalability
• Network management
• Policy management
TYPES OF VPN
1) Remote Access
VPN 2) Site-to-Site
VPN
1) INTERNET VPN
2) INTRANET VPN
Remote Acces VPN
Site-to-Site VPN
Through the use of dedicated equipment and large-scale encryption, a company can
connect multiple fixed sites over a public network such as the Internet. Site-to-site
VPNs can be one of two types:
• Intranet-based - If a company has one or more remote locations that they
wish to join in a single private network, they can create an intranet VPN to
connect LAN to LAN.
• Extranet-based - When a company has a close relationship with another
company (for example, a partner, supplier or customer), they can build an
extranet VPN that connects LAN to LAN, and that allows all of the
various companies to work in a shared environment.
VPN SECURITY
As we know that security is very important for any system in such way VPN system
is also uses many security techniques. A well-designed VPN uses several methods
for keeping your connection and data secure:
• Firewalls
• Encryption
• IPSec
• AAA Server
FIREWALLS
A Firewall provides a strong barrier between your private network and the Internet.
You can set firewalls to restrict the number of open ports, what type of packets are
passed through and which protocols are allowed through. Some VPN products, such
as CISCO 1700 series router, can be upgraded to include firewall capabilities by
running the appropriate Cisco IOS on them. You should already have a good
firewall in place before you implement a VPN, but a firewall can also be used to
terminate the VPN sessions
ENCRYPTION
Encryption is the process of taking all the data that one computer is sending to
another and encoding it into a form that only the other computer will be able to
decode. Most Computer encryption techniques belong to one of two categories:
• Symmetric-key encryption
• Public-key encryption
•
In symmetric-key encryption, each computer has a secret key (code) that it can
use to encrypt a packet of information before it is sent over the network to another
computer. Symmetric-key requires that you know which computers will be talking
to each other so you can install the key on each one. Symmetric-key encryption is
essentially the same as a secret code that each of the two computers must know in
order to decode the information. The code provides the key to decoding the
message. Think of it like this: You create a coded message to send to a friend in
which each letter is substituted with the letter that is two down from it in the
alphabet. So "A" becomes "C," and "B" becomes "D". You have already told a
trusted friend that the code is "Shift by 2". Your friend gets the message and
decodes it. Anyone else who sees the message will see only nonsense.
Public-key encryption uses a combination of a private key and a public key. The
private key is known only to your computer, while the public key is given by your
computer to any computer that wants to communicate securely with it. To decode
an encrypted message, a computer must use the public key, provided by the
originating computer, and its own private key. A very popular public-key
encryption utility is called Pretty Good Privacy (PGP), which allows you to
encrypt almost anything. You can find out more about PGP at thr PGP site.
IPSec
IPSec has two encryption modes: tunnel and transport. Tunnel encrypts the header
and the payload of each packet while transport only encrypts the payload. Only
systems that are IPSec compliant can take advantage of this protocol. Also, all
devices must use a common key and the firewalls of each network must have very
similar security policies set up. IPSec can encrypt data between various devices,
such as:
• Router to router
• Firewall to router
• PC to router
• PC to server
AAA Servers
AAA (authentication, authorization and accounting) servers are used for more
secure access in a remote-access VPN environment. When a request to establish a
session comes in from a dial-up client, the request is proxied to the AAA server.
AAA then checks the following:
The accounting information is especially useful for tracking client use for security
auditing, billing or reporting purposes.
CONCEPT OF TUNNELING
Most VPNs rely on tunneling to create a private network that reaches across the
Internet. Essentially, tunneling is the process of placing an entire packet within
another packet and sending it over a network. The protocol of the outer packet is
understood by the network and both points, called tunnel interfaces, where the
packet enters and exits the network.
• Carrier protocol - The protocol used by the network that the information
is travelling over
• Passenger protocol - The original data (IPX, NetBeui, IP) being carried
Tunneling has amazing implications for VPNs. For example, you can place a packet
that uses a protocol not supported on the Internet (such as NetBeui) inside an IP
packet and send it safely over the Internet. Or you could put a packet that uses a
private (non-routable) IP address inside a packet that uses a globally unique IP
address to extend a private network over the Internet.
A Tunneling Demonstration
Site-to-Site Tunneling
Remote-Access Tunneling
In a remote-access VPN, tunneling normally takes place using PPP. Part of the
TCP/IP stack, PPP is the carrier for other IP protocols when communicating over
the network between the host computer and a remote system. Remote-access VPN
tunneling relies on PPP.
Each of the protocols listed below were built using the basic structure of PPP and
are used by remote-access VPNs.
1. CUSTOMER REQUIRMENT.
2. SURVEY
Customer Requiremet
Every system has a life cycle so as that VPN too have a life cycle the life cycle of any
VPN begins with customer requirement face. Generally the requirement of the
customer is of two types
a) If a company has one or more remote locations that they wish to join in a
single private network, they can create an intranet VPN to connect LAN to LAN
b) When a company has a close relationship with another company (for example,
a partner, supplier or customer), they can build an extranet VPN that connects LAN
to LAN, and that allows all of the various companies to work in a shared
environment.
Depending on the requirement tulip send its sales person for further queries. Like
that of the bandwidth required, what kind of data transfer will it be voice or simple
file transfer, or he wants to run a application like SAP or other. Sales officer tells the
approximations of the link installation. And he forwards a report to the back office
for the survey report. Then afterwards the project manager decides the team size to
implement the different links .
The following is the CASE STUDIES of the various work performed in the
period of Industrial Training (w.e.f 08 ) at TULIP TELECOM LIMITED.
The followed is the details of all the work performed at both client as well as
Tulip Side.
4) VOIP PHONES
5) VIDEO CONFRENSING
New Installation :
There can be many reasons of malfunctioning of the link at client side. Some of
them is specified below:
3) Frequency Interference.
4) Conflicting IP.
5) Cable Breakage and Hanging of Equipments due to Bad Environmental
Condition.
INSPECTION OF CPE :
Inspection includes checking the Client Side Equipments (CPE) regularly for
their better working of Link.
Following is the work done while performing inspection at client site :
3) Checking the bandwidth given to the client and IP Schema of the client.
BSR
The BSR, installed at the Base Station, is an encased outdoor radio module providing
a 9 pin D-type port for
RS-232 serial interface and a 15 pin D-type port for data, synchronization, and
power interfaces. The BSR is available in two models: BSR with an integral antenna
(BSR 900 MHz TDD V-pol); BSR with two N-type ports
(displayed below) for attaching up to two external antennas (BSR 900 MHz TDD
Dual Ext).
SPR
The SPR is an encased CPE outdoor radio module providing access to a 15 pin
Dtype port for Ethernet, serial, and power interfaces. The SPR model is available in
two models: SPR with an integral antenna (SPRL
900MHz TDD V-pol) and SPR with an N-type port for attaching an external antenna
(SPR 900MHz TDD Ext).
-Minimum multipath fading: Some of the transmitted signals may be reflected from
a nearby building, by water under the signal path, or from any other reflectors. This
reflected ("bounced") signal can then be received by the radio receiving the signal
and superimposed on the main received signal, thereby, degrading the signal
strength. Airspan recommends installing the outdoor radios at the rear of the
building’s roof instead of the front. When you install at the rear, the front of the
building blocks incoming signals from multipath reflections.
- Clean frequencies selected from Spectrum Analyzer results (see Chapters 9 and 13).
- Maximum received signal strength (RSS) at CPE by antenna alignment: For the
IDR, RSS can be
measured by the IDR's built-in RSS LEDs; for the SPR, RSS can be measured by
Airspan’s WipConfig program or by connecting Airspan's
RSS LED Plug Adapter.
- Radios are mounted as far as possible from sources of interference that could
degrade performance of radio. Ensure a minimum of 1-meter separation between co-
located outdoor units. Radios mounted as high as possible to avoid obstructions and
to increase link quality.
- The root mean square (RMS) delay spread at the Base Station is substantially
higher.
-Multipath interference at the CPE side (when using omni-directional antenna at the
Base Station) is substantially higher. In fact, when using an omni-directional
antenna, the existence of clear Fresnel
zone between BSR and SPR/IDR is insufficient to eliminate multipath interference,
since multipath, in this case, can be caused by reflections originating from obstacles
outside the Fresnel zone.
To define BSR transmit power taking into consideration cable loss (using
WipManage):
1.In the BSR Zoom window, from the Configuration menu, point to RF, and then
choose Power Settings.
2. Ensure the Power Management Mode Active check box is cleared. On the Power
Level slide ruler, define the BSR’s maximum power level, e.g. 23 dBm.
3. In the Loss Compensation field, enter the power to compensate for power
attenuation due to cable length (i.e. cable loss compensation), e.g. 4 dB. 4. Click
Apply, and then reset the BSR to apply the new power settings.
Therefore, taking cable loss into consideration, the total power level of 27 dBm (23
plus 4) is achieved.
Mounting of out door Radio units
Pole Mounting
The BSR and SPR can be pole mounted to avoid radio wave obstructions between
BSR and SPR. The supplied pole-mounting bracket is designed to support the
BSR/SPR on a round pole of 45mm diameter.
To pole mount the BSR/SPR
1. Attach the mounting bracket to the BSR/SPR using two stainless steel bolts.
2. Attach the clamping bracket to the mounting bracket using two M8-stainless steel
bolts.
3. Attach the Clamping bracket to the pole by placing the two U-bolts around the
pole, and then inserting the U-bolt through the Clamping bracket and securing it
by screwing the two bolts on the U-bolt.
4. Adjust the vertical position of the BSR/SPR. Lock the BSR/SPR at the desired
position by inserting the locking bolt in the desired position. Once the correct
angle has been set both bolts must be tightened to lock the BSR/SPR bracket in
place.
5. Adjust the BSR/SPR horizontal position by rotating the BSR/SPR about the pole,
and then tightens the Ubolt.BSR/SPR positioning is obtained in two planes by
adjustment of the mounting bracket assembly as shown in the figure below.
Cabling
5
BSR-to-BSDU Cabling
The BSR interfaces with the provider’s backbone through the BSDU (or
SDA). The BSR connects to the BSDU using a CAT 5 cable. (The BSR-toSDA
cabling is the same as SPR-to-SDA cabling.
Cable connection
1. Connect the 15-pin D-type male connector to the BSR’s 15-pin port.
2. Connect the 15-pin D-type male connector, at the other end of the CAT 5 cable,
to one of the BSDU’s 15-pin D-type ports labeled BSR, located on the BSDU’s
rear panel.
SPR-to-SDA Cabling
The SPR interfaces with the subscriber’s Ethernet network (LAN) through the SDA.
The SPR connects to the SDA using a CAT 5 cable.
6
Cable connection
1. Connect the 15-pin D-type male connector, at one end of the CAT 5 cable, to the
SPR’s 15-pin port.
2. Connect the 15-pin D-type male connector, at the other end of the CAT 5 cable, to
the SDA’s 15-pinD-type
Software Installation
Hardware requirements:
Initial Configuration
To successfully establish an air and network link between the BSR and SPRs/IDRs,
the following initial configuration settings (using WipConfig) must exist:
1. Correct IP and subnet addresses configured (according to your network
addressing scheme)
2. Correct BSR's Air MAC address configured for BSR
3. Correct BSR's Air MAC address assigned to SPRs/IDRs
4. Identical frequency table configured for BSR and SPRs/IDRs
5. Identical maximum transmission rate configured for BSR and SPRs/IDRs
6. dentical mode (i.e. router or bridge) configured for BSR and SPRs/IDRs
Default settings:-
Airspan’s factory default settings for the AS WipLL devices are listed in the
following table:
BSR Initialization
--Air MAC Address: enter the BSR’s Air MAC address (0x0000 through
0xFFFF), e.g. 0x1200
--Frequency Table ID: enter frequency table number used by BSR (0
through 63)
8. On the toolbar, click the Write button.
9. On the toolbar, click the Reset button to reset the BSR; A Warning message box
appears.
10. Click Yes to confirm BSR reset.
The figure below displays the BSR configured in the bridge mode.
SPR Initialization
The figure below displays the SPR/IDR configured in the bridge mode.
Analyzing the RF Spectrum
Before setting up your wireless link between Base Station and subscribers, Airspan
recommends analyzing the RF spectrum at the
Base Station to select only clear frequency channels (i.e. without interferences) for
building a frequency table for the wireless transmission.
Airspan recommends using frequencies that are approximately 28, 20, and 12 dB
above interference levels to effectively operate in 8- (4 Mbps/3 Mbps), 4-(2 Mbps),
and 2-level FSK (1.33 Mbps/1 Mbps), respectively.
1. Start WipConfig and then connect WipConfig to the BSR by performing one of the
following:
--Serial mode: on the toolbar, select the Serial option, and then click Connect.
--IP mode: on the toolbar, select the Network option, and then in the Remote
Agent field, enter the ASWipLL device's IP address, and then click Connect.
2. In the Outlook bar, click the Spectrum Analyzer button; A message box appears
informing you that the device will lose connection with all other devices.
3. Click OK.
Before you can start analyzing the spectrum, you need to define various parameters in
the Spectrum Analyzer.
5. To define the frequency range for which you want to analyze, define the following
fields:
--Start Freq: frequency from where you want to scan (i.e. lower frequency)
--Stop Freq: frequency to where you want to scan (i.e. upper frequency)
Viewing Results:-
The Spectrum Analyzer results are plotted on the graph as well as displayed in the
Results table (to access the Results table simply click the Results tab).
--Average received signal strength (RSS) per frequency (plotted white line on
the graph)
--Maximum hold received signal strength (RSS) per frequency (plotted yellow
line on the graph)
--Distance (in spectrum RF) that the BSR/PPR can establish a viable
communication link with another transmitter. This is displayed in the
TxRxOffset field.
9
1.Define PC’s (i.e. Ethernet card) IP address so that it’s in same subnet as the
BSR/BSDU.
2.Configure PC’s default gateway with the IP address of the BSR, or with the IP
address of a router if oneexists between the PC and BSR.
Once you have initialized the BSR and SPR/IDR using WipConfig, you need to add
various WipManage elements to establish a viable air and network link between the
BSR and SPR/IDR.
Adding a BS group:- To
add a BS Group:
1. In the Database Tree, right-click , and then from the shortcut menu, choose
Add BS Group.
Adding a BS:-
You can now add a Base Station (BS) to the BS Group you added in the previous
subsection.
To add a BS:
1. In the Database Tree, click the (e.g. “Manahattan_1”) branch to which you want
to add the BS.
2. In the BSs Map view (in the right pane), right-click an empty area, and then
from the shortcut menu choose Add BS; The BS Add dialog box appears.
3. In the BS Name field, enter a name for the BS, e.g. “Times Square”, and then
click OK.
Adding a BSR
You can add up to six BSRs to each BSDU, allowing a maximum of 24 BSRs (6
BSRs x 4 BSDUs) per BS.
In our example, we need to add a BSR with IP address 10.0.0.10.
To add a BSR:
1. In the Database Tree, double-click the (e.g. “Times Square”) branch.
2. Right-click one of the six blue rectangles in the same row as the BSDU to which
you want to add the BSR, and then from the shortcut menu, choose Add BSR; The
BSR-Add dialog box appears.
3. In the Manage IP field, enter the BSR’s IP address, e.g. 10.0.0.10.
4. In the Get Community and Set Community fields, enter the SNMP community
rights.
5. Click OK.
3. Click OK; The SPR index #2 icon appears green, as shown below, indicating that
a viable air and network link exists with the SPR/IDR. You can now manage the
SPR/IDR.
Testing BSR/SPR Network Link:-
You can test the BSR-SPR/IDR link by pinging the SPR/IDR from a PC located
behind the BSR.
Site A Si t e B
P Up to 80 km P BX
B (50 miles)
X
E 1 / T1 E 1/ T1
E1/ E 1 / T1
T1
LAN LAN
Figure 1-1. Typical
Application
Features
Wireless Link
WinLink-1000 delivers up to 48 Mbps data rate for Ethernet and E1/T1 traffic. The
system supports a variety of spectrum bands and can be configured to operate in any
channel on the band with a carrier step resolution of 5 MHz.
WinLink-1000 operation complies with ETSI, CSA and the FCC 47CFR Part 15 and
subpart C and E requirements.
LAN Interface
The WinLink-1000 LAN port provides 10/100BaseT interfaces with autonegotiation
and transparent VLAN support. Traffic handling is provided by a MAC-level self-
learning bridge.
TDM Interface
WinLink-1000 System
ODU includes a power connector, which receives -48 VDC, and RJ-45 for Ethernet
traffic from the indoor unit (IDU).
The ODU is attached to a mast using a special mounting kit, which is supplied with the
unit.
Indoor Unit (IDU): There are two types of IDU cages. IDU-E that is a plastic
box of ½ x 19 in. and IDU-C that is based on a metal 19in. box address the
carrier-class applications. IDU is the interface unit between the ODU and the
user. It converts 100–
240 VAC to -48VDC, and feeds the ODU by it. The IDU does not store
any configuration data. Therefore, there is no need for additional
configuration of the WinLink-1000 system when replacing an IDU.
Before starting the installation, use the Link Budget Calculator utility to calculate
expected performance of the link. You can vary parameter inputs to the calculator to
determine the optimum system configuration. The utility is described in
Package Contents
• ODU
• IDU-E
• 110V/240V adaptor
• IDU-C
• For DC model, -48 VDC with 3-pin terminal block connector (green)
3. Connecting power.
The ODU is the transmitting and receiving element of the WinLink-1000 system. The
ODU can be mounted on a mast or a wall. In both installations, the supplied mounting
kit is used to secure the ODU.
2. Attach the ODU unit to the mast. Refer to for the ODU mounting instructions.
4. Attach the ODU cable to the RJ-45 connector. Refer to for the connector pinout.
5. Secure the cables to the mast or brackets using provided UV-rated cable ties.
The ODU cable conducts all the user traffic between the IDU and the ODU. The
ODU cable also provides -48 VDC supply to the ODU. The maximum length for one
leg of the ODU cable is 100m (328 ft) in accordance with10/100BaseT standards.
ODU cable is supplied pre-assembled with RJ-45 connectors, at the length specified
when ordering. If the ODU cable was not ordered, use Cat. 5e shielded cable, the
wiring specifications are given in
1. Route the cable from the ODU location into the building, leaving some spare.
Secure the cable along its path.
2. Connect the ODU cable to the RJ-45 connector on the IDU panel designated
WAN. illustrates a typical panel of the IDU-E and IDU-C.
1. Connect the 2-pin plug of the AC/DC converter to the 2-pin DC power
connector on the IDU-E rear panel.
2. Connect the AC/DC converter 3-prong plug to mains outlet.
For AC power model, connect the AC cable 3-prong plug to mains outlet.
For DC power model, connect to DC supply on the rack (male connector
for the terminal block is included).
• Graphics: Card and Monitor that supports 1024 768 screen resolution with
16
• bit color
2. If the installation does not start automatically, run WinLink.exe from the CD-
ROM
drive.
3. Follow the on screen instructions of the installation wizard to complete setup of the
WinLink-1000 Management program in the desired location.
Menu
Aligning the WinLink-1000 ODUs
Perform the WinLink-1000 ODU alignment using the Buzzers located inside the
ODUs. Alignment of a WinLink-1000 link must be performed by two people
simultaneously, at site A and at site B.
Warning 2 . Align the site A ODU in the direction of the site B ODU.
3. Align the site B ODU in the direction of the site A ODU
Installation and definition of all parameters are applied to both sides of the link.
1. Verify that the management station is properly connected to the same LAN as the
IDU, and the WinLink Manager application is running.
2. In the toolbar, click the Link Installation button. The
Installation wizard open
Figure . Link Installation Wizard
The Rate Select dialog box appears lists throughput rates and capacities.
.
Figure 2-10. Installation Wizard, Rates dialog box
11. Select a suitable air interface rate according to the services required.
13. A question box pops up, asking if you want to re-evaluate the link. Click Yes to
change the rate No to keep the existing rate.
Selecting a new rate causes the system quality to change. The quality bar
shows the adjustment until the system finds the best quality link.
E1/T1 – Select the E1/T1 field, if you intend to transmit E1/T1 data andEthernet
data.The Ethernet BW field shows the remaining bandwidth in Mbpsavailable for
Ethernet. The available bandwidth depends on the number of E1/T1 ports selected.
Select the Ethernet field, if you intend to transmit Ethernet data only
16. Click Next
The Finish screen appears
Figure 2-12. Installation Wizard, Finish Screen
17. Click Finish to complete the installation wizard.
When the wireless link is established between the site A and site B units, the
Link Status indication bar of the Main menu is within the green area.
18. Verify that the radio signal strength (RSS) in the Main menu is according to
expected results.
The optional IDU-C is a standalone rackmounted unit. This unit has only
front panel connections.illustrates the typical panels of the IDUs.
There are various types of routers, but the best is delivered by the CISCO
Company. It has various types of series in itself, which is shown below :
1) THE 800
2) THE 1800
3) THE 2800
4) THE 3800
COMMANDS:
* Router# (type in config t)
Router>enable
Router#config
Router(config)#hostname N115-7206
N115-7206(config)#interface serial 1/1
N115-7206(config-if)ip address 192.168.155.2 255.255.255.0
N115-7206(config-if)no shutdown
N115-7206(config-if)ctrl-z
N115-7206#show interface serial 1/1
N115-7206#config
N115-7206(config)#interface ethernet 2/3
N115-7206(config-if)#ip address 192.168.150.90 255.255.255.0
N115-7206(config-if)#no shutdown
N115-7206(config-if)#ctrl-z
N115-7206#show interface ethernet 2/3
N115-7206#config
N115-7206(config)#router rip
N115-7206(config-router)#network 192.168.155.0
N115-7206(config-router)#network 192.168.150.0
N115-7206(config-router)#ctrl-z
N115-7206#show ip protocols
N115-7206#ping 192.168.150.1
N115-7206#config
N115-7206(config)#ip name-server 172.16.0.10
N115-7206(config)#ctrl-z
N115-7206#ping archie.au
N115-7206#config
N115-7206(config)#enable secret password
N115-7206(config)#ctrl-z
N115-7206#copy running-config startup-config N115-
7206#exit
Configuration Mode
Configuration mode has a set of submodes that you use for modifying
interface settings, routing protocol settings, line settings, and so forth. Use
caution with configuration mode because all changes you enter take effect
immediately.
To enter configuration mode, enter the command configure terminal and exit
by pressing Ctrl-Z.
Note:
Almost every configuration command also has a no form. In general, use the
no form to disable a feature or function. Use the command without the
keyword no to re-enable a disabled feature or to enable a feature that is
disabled by default. For example, IP routing is enabled by default. To
disable IP routing, enter the no ip routing command and enter ip routing to
re-enable it.
Getting Help
In any command mode, you can get a list of available commands by entering
a question mark (?).
Router>?
To obtain a list of commands that begin with a particular character sequence, type
in those characters followed immediately by the question mark (?).
Router#co?
configure connect copy
To list keywords or arguments, enter a question mark in place of a keyword
or argument. Include a space before the question mark.
Router#configure ?
memory Configure from NV memory network
Configure from a TFTP network host terminal
Configure from the terminal
You can also abbreviate commands and keywords by entering just enough
characters to make the command unique from other commands. For
example, you can abbreviate the show command to sh.
Configuration Files
Any time you make changes to the router configuration, you must save the
changes to memory because if you do not they will be lost if there is a system
reload or power outage. There are two types of configuration files: the
running (current operating) configuration and the startup configuration. Use
the following privileged mode commands to work with configuration files.
IP Address Configuration
To control how packets received from an interface are processed, use one of the
following commands:
Command Purpose ip rip receive version 1 Configure an interface to accept
only RIP version 1 packets. ip rip receive version 2 Configure an interface to
accept only RIP version 2 packets ip rip receive version 1 2 Configure an
interface to accept only RIP version 1 or 2 packets.
Example:
Router(config-router)#network 192.168.10.0 255.255.255.0 area
0.0.0.0
Repeat this step for all the network numbers.
To turn off OSPF, use the following command.
Router(config)#no router ospf process-id
Command Purpose ip ospf cost cost Explicitly specify the cost of sending a
packet on an OSPF interface. ip ospf retransmit-interval seconds Specify the
number of seconds between link state advertisement retransmissions for
adjacencies belonging to an OSPF interface. ip ospf transmit-delay seconds
Set the estimated number of seconds it takes to transmit a link state update
packet on an OSPF interface. ip ospf priority number Set router priority to
help determine the OSPF designated router for a network. ip ospf
hellointerval seconds Specify the length of time, in seconds, between the
hello packets that a router sends on an OSPF interface. ip ospf dead-interval
seconds Set the number of seconds that a router’s hello packets must not
have been seen before its neighbors declare the OSPF router down. ip ospf
authentication-key password Assign a specific password to be used by
neighboring OSPF routers on a network segment that is using OSPF’s simple
password authentication.
Interior Gateway Routing Protocol (IGRP)
Tunneling
Most VPNs rely on tunneling to create a private network that reaches across
the Internet. Essentially, tunneling is the process of placing an entire packet
within another packet and sending it over a network. The protocol of the
outer packet is understood by the network and both points, called tunnel
interfaces, where the packet enters and exits the network.
A) Carrier protocol - The protocol used by the network that the information is
traveling over
B)Encapsulating protocol - The protocol (GRE, IPSec, L2F, PPTP, L2TP) that is
wrapped around the original data
C)Passenger protocol - The original data (IPX, NetBeui, IP) being carried
Tunneling has amazing implications for VPNs. For example, you can place a
packet that uses a protocol not supported on the Internet (such as NetBeui)
inside an IP packet and send it safely over the Internet. Or you could put a
packet that uses a private (non-routable) IP address inside a packet that uses a
globally unique IP address to extend a private network over the Internet.
Tunneling: Site-to-Site
Tunneling: Remote-Access
In a remote-access VPN, tunneling normally takes place using PPP. Part of
the TCP/IP stack, PPP is the carrier for other IP protocols when
communicating over the network between the host computer and a remote
system. Remote-access VPN tunneling relies on PPP. Each of the protocols
listed below were built using the basic structure of PPP and are used by
remote-access VPNs.
L2TP can be used as a tunneling protocol for site-to-site VPNs as well as remote-
access VPNs. In fact, L2TP can create a tunnel between:
Client and router
NAS and router
Router and router
Think of tunneling as having a computer delivered to you by UPS. The
vendor packs the computer (passenger protocol) into a box (encapsulating
protocol) which is then put on a UPS truck (carrier protocol) at the vendor's
warehouse (entry tunnel interface). The truck (carrier protocol) travels over
the highways (Internet) to your home (exit tunnel interface) and delivers the
computer. You open the box (encapsulating protocol) and remove the
computer (passenger protocol). Tunneling is just that simple!
As you can see, VPNs are a great way for a company to keep its employees and
partners connected no matter where they are.
As the link is installed its now the time to test the link as every instrument
has a testing cycle in VPN connectivity we too have a testing cycle. We use
Netpersec for testing the load. If the link is taking adequate amount of load
link is handed over to the customer other wise we move back for further
quality improvement of the link.
FIREWALL
Introduction
Requirements
Customer wants to allow some websites and rest will be blocked.
Connectivity
In the test setup I am only permitting www.cisco.com domain rest will be denied.
Monitoring Firewall
a) Click on Monitoring->Diagnostic tab and you will access basic
troubleshooting tools.
b) Under Monitoring->Firewall Logs and Email , we can add the
syslog server ip address and fetch the logs.
Remote Management
Click Administarion-> Remote Management -> Allow remote management
and you canprovide access as per your ease
Note:- By default all the lan ports are of group 1 part. You can change the geoups
as per users.
If you want to restrict internal LAN users from access to certain sites on the
Internet, you can use the VPN firewall’s Content Filtering and Web
Components filtering. By default, these features are disabled; all requested
traffic from any Web site is allowed. If you enable one or more of these
features and users try to access a blocked site, they will see a “Blocked by
NETGEAR” message.
Several types of blocking are available:
VIDEO CONFRENSING
1-2
VSX 5000 Set-top System
The VSX 6000A systems are entry-level video conferencing systems for IP
and
SIP networks only.
VSX 7000s Set-top Systems
The VSX 7000s systems provide cutting-edge video conferencing
technology for IP and other networks. The subwoofer provides additional
depth to the sound, creating a high-quality sonic space comparable to a
home theater system.
2. Place the system in the desired location, with the rounded front portion
hanging over the front of the monitor or shelf. Leave enough space to
work, so that you can connect the cables easily.
3. Remove the packaging collar from around the VSX system camera.
Positioning Component Systems
The VSX 7000e and VSX 8000 systems are designed to be placed on a
tabletop or in an equipment rack.
If you received a network interface module with your system, you may find
it
convenient to install it before positioning the system. Refer to the
installation sheet that you received with the network interface
module.
Feet
Introducing the VSX Series
Networks
This guide covers network types used worldwide. Please note that not all network
types are available in all countries.
Getting the Network Ready
Before you begin configuring the network options, you must make sure your
network is ready for video conferencing.
To begin, refer to the Preparing Your Network for Video Conferencing
document, available at www.polycom.com/videodocumentation. This
document contains information you need to prepare your network, such as
worksheets that will help you order ISDN.
Network Connectivity Checklist
You will need this information to make and receive video calls at your site:
Connecting to the LAN
You must connect the system to a LAN to:
• Make IP calls
• Access VSX Web
If... This information:
Should be provided by your:
The MP-104 supports up to 4 analog telephone loop start FXS or FXO ports, shown
in Figure
Figure 1-3: MP-104 Gateway Front View
The MP-102 supports up to 2 analog telephone loop start FXS ports, shown in
Figure .
Figure 1-4: MP-102 Gateway Front View
The layout diagram illustrates a typical MP-108 and MP-104 or MP-102 VoIP
application.
Figure 1-5: Typical MP-1xx VoIP Application
BACK VIEW
CONNECTIVITY WITH PHONES
Configuring the MP-1xx Basic Parameters
To configure the MP-1xx basic parameters use the Embedded Web Server’s
‘Quick Setup’
4. Select the coder (i.e., vocoder) that best suits your VoIP system
requirements. The default
coder is: G.7231 30 msec. To program the entire list of coders you want the MP-
1xx to use,
click the button on the left side of the ‘1st Coder’ field; the drop-down list
for the 2nd to 5th coders appear. Select coders according to your system
requirements. Note that coders higher on the list are preferred and take
precedence over coders lower on the list.
5. To program the Tel to IP Routing table, press the arrow button next to
‘Tel to IP Routing
Table’. For information on how to configure the Tel to IP Routing table, 6.
To program the Endpoint Phone Number table, press the arrow button next
to ‘Endpoint
Phone Numbers’. For information on how to configure the Endpoint Phone
Number table,
7. Click the Reset button and click OK in the prompt; The MP-1xx applies
the changes and restarts. This takes approximately 1 minute to complete.
When the MP-1xx has finished restarting, the Ready and LAN LEDs on the
front panel are lit green.
You are now ready to start using the VoIP gateway. To prevent unauthorized access
to the MP-
1xx, it is recommended that you change the username and password that are used
to access the
.
MP-1xx H.323 to IP
Routing Table
The Tel to IP Routing Table is used to route incoming Tel calls to IP addresses.
This routing table
associates a called / calling telephone number’s prefixes with a destination
IP address or with an
FQDN (Fully Qualified Domain Name). When a call is routed through the
VoIP gateway
(Gatekeeper isn’t used), the called and calling numbers are compared to the
list of prefixes on the
IP Routing Table (up to 50 prefixes can be configured); Calls that match these
prefixes are sent
to the corresponding IP address. If the number dialed does not match these
prefixes, the call is not made.
When using a Gatekeeper, you do not need to configure the Tel to IP
Routing Table. However, if you want to use fallback routing when
communication with Gatekeepers is lost, or to use the
‘Filter Calls to IP’ and ‘IP Security’ features or to assign IP profiles, you
need to configure the IP Routing Table.
Note that for the Tel to IP Routing table to take precedence over a
Gatekeeper for routing calls, set the parameter ‘PreferRouteTable’
to 1. The gateway checks the
'Destination IP Address' field in the 'Tel to IP Routing' table for a match
with the outgoing call. Only if a match is not found, a Gatekeeper is used.
Possible uses for Tel to IP Routing can be as follows:
• Can fallback to internal routing table if there is no communication with the
Gatekeepers.
• Call Restriction – (when Gatekeeper isn’t used), reject all outgoing Tel IP
calls that are associated with the destination IP address: 0.0.0.0.
• IP Security – When the IP Security feature is enabled (SecureCallFromIP
= 1), the VoIP gateway accepts only those IP Tel calls with a source IP
address identical to one of the IP addresses entered in the Tel to IP Routing
Table.
• Filter Calls to IP – When a Gatekeeper is used, the gateway checks the Tel
IP routing table before a telephone number is routed to the Gatekeeper. If
the number is not allowed (number
isn’t listed or a Call Restriction routing rule was applied), the call is released.
• Assign Profiles to destination address (also when a Gatekeeper is used).
• Alternative Routing – (When Gatekeeper isn’t used) an alternative IP
destination for telephone number prefixes is available. To associate an
alternative IP address to called
telephone number prefix, assign it with an additional entry (with a different
IP address), or use an FQDN that resolves to two IP addresses. Call is sent to
the alternative destination when one of the following occurs:
No ping to the initial destination is available, or when poor QoS (delay or
packet loss,
calculated according to previous calls) is detected, or when a DNS host
name is not resolved. For detailed information on Alternative Routing,
refer to Section
8.4 on page
When a release reason that is defined in the ‘Reasons for Alternative Tel to
IP Routing’ table is received. For detailed information on the ‘Reasons for
Alternative Routing
Tables’
Tip: Tel to IP routing can be performed either before or after applying the
number manipulation rules. To control when number manipulation is
done, set the
‘Tel to IP Routing Mode’ parameter
To configure the Tel to IP Routing table, take these 6 steps:
1. Open the ‘Tel to IP Routing’ screen (Protocol Management menu >
Routing Tables
submenu > Tel to IP Routing option); the ‘Tel to IP Routing’ screen is displayed
.
2. In the ‘Tel to IP Routing Mode’ field, select the Tel to IP routing
mode 3. In the ‘Routing Index' drop-down list, select the range of entries
that you want to edit.
4. Configure the Tel to IP Routing table according to
5. Click the Submit button to save your changes.
6. To save the changes so they are available after a power fail refer to
Section
BIBLIOGRAPHY
2. Introduction to VPN
3. Link installation
5. Airspan modems
6. Radwin modems
7. Routers
8. Video confrensing
9. Voip phones
10.Firewall