home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.dcom.vpn      VPN protocols, clients, awesomeness      2,348 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 2,280 of 2,348   
   jack masters to Larry Erickson   
   Re: vpn hardware solution   
   11 Sep 08 20:12:11   
   
   39077d1c   
   From: jcfmasters@yahoo.com   
      
   Larry Erickson wrote:   
      
   >   
   > Thanks a lot for your response.  It is nice to know that other people   
   > have similar situations.  I am pretty unfamiliar with   
   > virtual machines so I have a couple more questions.  First, what is   
   > the reason most customers will not let you   
   > connect directly to the internet?  Is is security, cost, or another   
   > reason?  Is there anything that can be done to make   
   > this idea more appealing to customers?  Also if you could connect   
   > directly to the internet, what would be the best way   
   > to remotely connect?   
      
   Various security concerns; from the customers' point of view: 'There is   
   something on my network that is connected directly to the internet; I   
   have no control over setup, security updates etc., so I am not happy."   
   If you do not have to be connected to the customer's own network (e.g.   
   for SCADA systems that the customer wants to see from his desktop) there   
   is normally no problem besides the cost of a separate connection. If   
   there *is* a need to be connected to the customers' network, the best   
   solution is to have the customer put in a firewall between your network   
   and theirs. That puts updates and firewall maintenance responsibility on   
   them too ;)   
      
   >   
   > We do like to keep all of our static IP address layouts the same   
   > across all our installations.  As far as the virtual   
   > machine solution goes, what do you recommend using for a windows   
   > platform.  I think you were saying to set up our   
   > normal network setting on our main pc, and then install a virtual   
   > machine on that pc also which the customers IT   
   > department installs their VPN link software.  We then connect  through   
   > the VPN to our pc's virtual machine, in which we can   
   > access our other network devices somehow.   
      
   Correct. We use VMWare, it is OS-independent for what we use (Windows VM   
   running under Linux or Windows). Install VMWare on a laptop, let the   
   customer play around in a VM to set up VPN, and copy the VM off the   
   laptop later. On the server in the office you end up with a collection   
   of VMs, if customer X needs support fire up the VM for customer X and   
   connect. Caveat: most VPNs restrict any other network access as long as   
   the VPN is connected, so if you have to copy files back and forth   
   between office and site you have to copy them to the VM first, connect,   
   then copy to site.   
      
    > In your last paragraph,   
   > are you saying that we should always be using two   
   > network cards, or use a hardware solution that can provide the same   
   > thing?  Sorry for all the questions, and again thanks for   
   > responding.   
   >   
      
   Matter of personal preference, and budget. I prefer a separate device   
   (e.g. I can also use it as a DHCP server for connecting laptops on-site,   
   and set it up as a proper firewall between control network and generic   
   office network), but a solution with two network cards, one inside the   
   customer's network and one on the control network can work too. Beware   
   of routing pitfalls if the customer's IP ranges overlap yours.   
   If you have the customer give you VPN access they might even be able to   
   put a firewall/router in that gives you direct access; otherwise you   
   will have to set things up so that you have access through their VPN to   
   a single IP address on the second network card, run a VPN or SSH server   
   on your machine, and route through there into the rest of the control   
   network.   
   Standard boxes exist that can do this (Cisco ASA series comes to mind,   
   other brands have similar things, but there you are talking fairly   
   serious money). If you have the expertise in-house (or can borrow it   
   from somewhere) to set up a small Soekris board it might be more   
   cost-effective.   
   And nobody says you can't have a back-up modem line attached to the same   
   box, as a back-up in case the VPN doesn't work. At one site we have a   
   little GSM modem that has come in handy when somebody dug up both the   
   primary *and* the back-up network lines near a customer's site.   
      
   All in all, it depends on how much money you want to spend, and how much   
   time in setting it up. A second-network-card solution might be a bit of   
   a pain to get set up, but if it is well-documented you start seeing the   
   savings with the next site.   
      
   J.   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca