Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Barricade™ VPN Broadband Routers (4 and 8 port)

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Module 5: Configuring Access for Remote Clients and Networks.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Implementing Secure Converged Wide Area Networks (ISCW)
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Windows 2000 Remote Access. Remote Access Overview With Windows 2000 remote access, remote access clients connect to remote access servers and are transparently.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Internet Protocol Security (IPSec)
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
NetComm Wireless VPN Functionality Feature Spotlight.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
TAX-AIDE Network Router Setup Network Printer Setups July SMT/TCS Training - Dallas1.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
How to setup VRT- 402N with VRT-401/311S?. Outline  Connections Topology  VRT-402N setup  VRT-401 setup.
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
Scenario & Hands-on 7-1 VPN Configuration-PPTP
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
SG-VRT ppt Page 1 VPN Broadband Communication Risk-free networking connection via PLANET PLANET Technology Corp.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
EMerge Browser Managed Security Platform Module 3: Startup eMerge Certification Course  Physical connection  TCP/IP Characteristics of PC  Initial connection.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Wireless Networks and the NetSentron By: Darren Critchley.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
EPipe 2344 Product Introduction. Protocols and Bandwidth Control Protocols TCP/IP, RIP, DHCP, TFTP, PPP, PPPoE, IPoE Bandwidth control (site-site) Multilink.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
The University of Oklahoma Virtual Private Network How it works.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Routing with Windows Server 2003 Chapter 9. Objectives for this Chapter Manage Routing And Remote Access routing interfaces Manage packet filters Manage.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
NETGEAR CONFIDENTIAL FVX538 ProSafe VPN Firewall 200.
Network Access for Remote Users Dr John S. Graham ULCC
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
Windows Vista Configuration MCTS : Advanced Networking.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Presentation transcript:

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Barricade™ VPN Broadband Routers (4 and 8 port)

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Overview This router is the perfect solution for creating secure Virtual Private Networking tunnels and sharing the Internet connection with multiple computers. This new VPN Router has an integrated VPN Server to support multiple VPN connections using IPSec, PPTP, and L2TP protocols. The Barricade VPN provides new VPN features like a Dynamic VPN function. This feature allows a user to configure a VPN connection on a Dynamic IP connection and when the IP Address changes, the VPN configuration will be updated to use the new IP Address automatically.

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Management Features – SNMP, Remote Management, System Logging DB9 COM port for Dial Up Networking VPN support: IPsec Tunnels (40), Built-in PPTP and L2TP Server, Dynamic VPN, IP Authentication Header (AH), IP Encapsulating Security Payload (ESP), Internet Key Exchange (IKE), and MD5/SHA1 Authentication LEDs: Power, Status, 1-WAN (10/100M), 4/8- LAN (10/100M) DDNS: TZO, DynDns, No-IP Firewall: SPI, DoS, Alerts, Syslog Server Specifications

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei EZ Install Wizard

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Status Status page is designed in the same configuration as our other standard routers

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Supported WAN Types

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Disabling VPN Passthrough

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei SNMP Management

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Dynamic/Static Routing

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei How To Configure IPSec VPN Step 1: Go to the VPN section and select the enable checkbox for [VPN] Step 2: Select the number of Tunnels you want to enable Step 3: Enter a Tunnel Name, select IKE or MANUAL for the method and click [More] Step 4: Local subnet value is the LAN SUBNET Step 5: Local netmask value is the LAN SUBNET MASK Step 6: Remote subnet value is the LAN SUBNET of the REMOTE NETWORK Step 7: Remote netmask value is the LAN SUBNET MASK of the REMOTE NETWORK Step 8: Remote gateway value is the WAN IP of the REMOTE NETWORK Step 9: Preshare key value is used to determine the network encryption Step 10: SAVE SETTINGS and then configure the IKE PROPOSAL and IPSEC PROPOSAL

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei How To Configure PPTP VPN Step 1: Go to the PPTP Server section and select the Enable radio button Step 2: Change the virtual IP value if necessary (this is the IP network that your PPTP clients will automatically be connected to) Step 3: Set the authentication protocol Step 4: Enter a tunnel name and set the username and password Step 5: Configure your remote VPN client to connect to the WAN IP of the router

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei How To Configure L2TP VPN Step 1: Go to the L2TP Server section and select the Enable radio button Step 2: Change the virtual IP value if necessary (this is the IP network that your L2TP clients will automatically be connected to) Step 3: Set the authentication protocol Step 4: Enter a tunnel name and set the username and password Step 5: Configure your remote VPN client to connect to the WAN IP of the router

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei SMCBR14VPN SMCBR18VPN Questions and Anwsers

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei What is the difference between SMCBR14VPN and SMCBR18VPN? The SMCBR14VPN has 4 LAN ports and the SMCBR18VPN HAS 8 LAN ports. There is no other difference. The firmware is the same for both

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei How many tunnels can be established? 40 IPSEC tunnels 5 PPTP tunnels 5 L2TP : Important, not L2TP/IPSEC, but just L2TP alone In total: 50

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Do I need two routers to establish a VPN connection? No. PPTP tunnels and L2TP tunnels can be created with the built in Windows VPN tools Although it is possible to use the built in IPSEC of Windows, it is much easier to use programs like TheGreenBow (Shareware), and Netscreen. There are advantages when using 2 SMCBR14VPNs, especially when connecting two remote offices: –No configuration on end clients –End clients will just “see” the other office as if it was located on the same LAN. –Please remember that the two routers should have different LAN addresses.

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Can the SMCBR14VPN act as a PPTP client? No, it can only act as a PPTP and L2TP server.

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Why can’t a PPTP client “see” the LAN clients on a SMCBR14VPN? The PPTP and L2TP server IP address are different from the LAN IP. Therefore PPTP clients can “see” each other but not the LAN clients. In order to solve this, one has to create a static route on the PPTP client. For example: –route add –If is your PPTP gateway and is the remote LAN behind the router.

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Can I use domain names and dynamic VPNs? Yes. The SMCBR14VPN supports Dyndns on the WAN side. As Peer IP address for the IPSEC tunnel, a domain name can be used Dynamic VPN is supported, i.e. the router will accept a VPN connection from any IP address with valid parameters

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei What WAN types are supported? Dynamic WAN (DHCP) PPPoE PPTP L2TP Static IP Big Pond Dial-up (also as backup for the others in case of failure)

Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei No IPSEC connect button? There is no “Connect” button, the connection will be established on demand when a client from the peer is accessed. The connection can be dropped with the “drop” button on the client list