Thursday, March 29, 2012

How To Get A New Zealand IP Address | change New Zealand ip address | Free vpn proxy


How To Get A New Zealand IP Address | change New Zealand ip address | Free vpn proxy

New Zealand ip address,ip address,change ip address,New Zealand proxy,ip address proxy,free vpn,ipad vpn,us vpn,vpn ipad ,vpn free,free vpn service,vpn account,vpn setup

How To Get A New Zealand IP Address-There are many web services which are available only to the people from New Zealand. These services use geographical IP filtering to block any users accessing it from outside New Zealand IP range.

 New Zealand VPN

In addition to their safety features VPNs offer great reliability and speed to its users as well and can be configured easily on any computing platform. Keeping these advantages in mind it is safe to say that the use of a New Zealandn VPN to get a New Zealandn IP address is the best available option for anyone living outside their country.



WHY WOULD YOU WANT TO CHANGE TO AN IP ADDRESS IN THE UNITED KINGDOM? 

Send all traffic over VPN connection | mac vpn traffic

Send all traffic over VPN connection | mac vpn traffic
 
 
MAC OS X VPN
1.Click on "Network" under System Preferences
 
2.Click the + sign to create a new service
 
3.From the Interface pop down menu choose "VPN". VPN Type: L2TP IPSec or PPTP
 
4.Change the Service Name to "BananaVPN" or whatever you like and then click "Create"
 
5.Click "Authentication Settings"
 
6.Put your server address, login and shared secret from your welcome email. Click Apply
 
7.Click Advanced (after apply!) and check the box "Send all traffic over VPN connection"
 
8. Click DNS and add the DNS servers by using the "+" sign, you need two 208.67.222.222 and 208.67.220.220 After you add them click "OK"
 
9.Click the box "Show VPN status in menu bar" so you can easily connect a

Wednesday, March 28, 2012

Android tablet VPN Setup

Android tablet VPN Setup
A virtual private network (VPN) is a kind of virtual tunnel that lets authorized people into the network, while blocking everyone else.  Check how to set up android phone vpn
 
Open the settings menu on your Android device.
Select "Wireless Settings" menu.
 

 
Select "VPN Settings" menu.

 
Select "Add VPN".

 
Select "Add L2TP/IPSec PSK VPN" option.
VPN Name = vpntraffic
Server = when you make order will email you
Pre-shared key = Click here to view the 'Pre-shared Key'.
L2TP Secret = Disabled/Unchecked
DNS Search Domains = 8.8.8.8
 

 
 
Tap the menu button on your device and select 'Save'.
 
 
$5 Package=One Account=US,AU,UK,CA,Russia,Italy,Spain,Japan,Korea,HK,India,etc.

You can  switch between our servers at any time (35+ country vpn server)

Tuesday, March 27, 2012

VPN Error 650 solution

VPN Error 650 solution
 
Error 650: The Remote Access server is not responding.
Resolution:
1) Proxy or firewall block like port 1723 and IP GRE 74.
2) Check the server type and uncheck most of them.
3) Make sure you type correct information in logon screen.
4) Check PPTP filtering. For the test, disable PPTP filtering on the server (Net Stop RASPPTPF), and see if you can establish a non-filtered connection.

Sunday, March 25, 2012

Buy Qatar QA VPN Service - Fast, Reliable and Secure!

Buy Qatar QA VPN Service - Fast, Reliable and Secure!

 

Vpntraffic is a leading Qatar vpn VPN services provider that enables our users from all around the world to enjoy Free Internet thought fast, secure and reliable servers. Vpntraffic provides a secure Virtual Private Network solution through High Speed Access for Qatar citizens, using servers located all around the world. You get a secured connection for all programs you are using, you are completely anonymous, your traffic is fully encrypted and you are totally protected. High-quality 1Gbit Network connectivity ensures that your VPN service will be fast wherever you are in the world.
 
 
We all understand the importance of a virtual private network. There are times when one wishes to remain completely anonymous and protected online. The peace and security that a vpn account can provide you with is priceless. An offshore vpn account is also helpful for those that wish to appear to be located in another country.
 
 
Vpntraffic provide worldwide Cheap VPN 200+ Country

In our package include 30+ Country VPN only $5 for one month ,

if you need other country VPN not in package ,please Contact us  or you can apply Free VPN 

Setting up VPN on Xbox 360

Setting up VPN on Xbox 360

In order to set up an Xbox 360 so it works with a VPN you need to have a wireless router, an Ethernet cross over cable, and a laptop with wireless and a LAN port plus an account with a VPN provider so that you can watch Hulu and Netflix outside the USA on Xbox 360.

 

Then, once you sign up for the VPN of your choice, all you need to do is:

  1. Plug the Xbox 360 into a laptop with a cross over cable
  2. Set the Xbox 360 Dashboard IP settings and DNS settings to automatic
  3. Click onto the laptop start menu, click network, select properties, and you should be in the network and sharing section of the laptop.
  4. Click on manage network connections
  5. Click on Local Area Connection and select Properties
  6. Choose Internet Protocol Version 4 (TCP/IPv4)
  7. Click  on Use the following IP address and put in the IP address of 192.168.0.1 with a subnet mask of 255.255.255.0. Be sure that the default gateway, the preferred DNS server, and the alternate DNS servers are all blank.
  8. Click on Your VPN properties
  9. Click on the sharing tab and choose allow other network users to connect through this computer's Internet connection.
  10. Under that is you home network connections info and in that drop down menu choose Local Area Connection (not your wireless connection).
  11. Be sure that establish a dial up connection is blank, as well as allow other network users to control. Both should be unchecked.
  12. Then click OK
  13. Confirm your laptop is connected to the Internet using your wireless connection and then that you are connected to your VPN provider.
  14. Do a network test on the Xbox Live and see if it works.

Now if all went well, you should be connected to the Internet and will be able to watch Hulu and Netflix outside the USA on Xbox 360 and enjoy your favorite shows and movies.

Saturday, March 24, 2012

VASCO’s DIGIPASS technology

ity for your iPhone, it is always good to finish your search on the best VPN service provider.However, the selection of the VPN solely depends on your specific choice whether you want a paid version or a free one.Both of them come handy in allowing you to browse anonymously via your iPhone, but with a settle difference where the paid VPN hold an edge over the free VPN services.Still, if you have a short-term purpose to serve or want to secure your browsing data during an abridged journey to a foreign location, Key Features_  Secure private networkMulti Screen Media VASCO's DIGIPASS technology combined with the VACMAN Middleware software suite, allowed MSM to secure its SSL/VPN solution in a very cost-effective manner. The authentication solution was seamlessly integrated into the existing back-end infrastructure using RADIUS protocol. Employees can now securely access the corporate network and its applications anywhere, anytime using DIGIPASS GO 6products. Since its launch in October 1995, the company created an impressive portfolio of programs ranging from the light-hearted to the supernatural, exploring various genres complimented by a mix of glamorous events and Bollywood blockbusters reaching more than 42 million households in India alone. Additionally, SET is also available in the United States, United Kingdom, Africa, Middle-East, Europe, Canada, Australia, New Zealand, Singapore, Nepal, Bangladesh, Maldives and Malaysia; reaching over 300 million households worldwide.STATIC PASSWORDS INADEQUATE FOR REMOTE USEIn order to allow its IT staff and telecommuters to access the corporate network and its resources, MSM implemented an in-house SSL

Friday, March 23, 2012

IP VPN address will not change

for advertising itself, de-tunneling packets from the Home Agent, and sending the packets to the Mobile Node. (5) Home Address: The IP address assigned to a Mobile Node in the Home Network. The IP VPN address will not change when the Mobile Node is roaming. (6) Care-of Address (CoA): The IP address which is assigned to the Foreign Agent. A Home Agent tunnels packets to Mobile Node's Care-of Address. Home Agents and Foreign Agents advertise their presence by broadcasting Agent Advertisement messages. The Mobile Node examines the Agent Advertisement messages to determine its location. If the MN is connected to its home network, it operates without mobility services. When the Mobile Node is connected to a foreign network, it registers the Care-of Address with its Home Agent. The registration process sets up necessary services to re-route packets.   When the Correspondent Node sends packets to the Mobile Node, the packets are first sent to the Home Agent. The HA encapsulates and tunnels the packets to the Foreign Agent and the FA de-tunnels the packets and sends the packets to the Mobile Node. When the Mobile Node sends packets to the Correspondent Node, the packets are first sent to the Foreign Agent. The FA directly forwards the packets to the Mobile Node. Figure 3-1 shows the operation of a Mobile IP (IPv4) connection. Figure 3-1 Mobile IPv4 Chapter 3: Mobile IP Overview  Page 22 © 2009 Chen Xu  Page 22 3.2 PROBLEMS IN MIPV4 When the Mobile Node roams in foreign networks, no  matter how close the correspondent node and the mobile node are, MIPv4 forces all packets from the Correspondent Node to be routed to the Home Agent and then to be  routed to the Mobile Node. However, packets from the Mobile Node can be routed to the Correspondent Node through the Foreign Agent directly. This mechanism has poor packet routing performance and is labelled "Triangular Routing" [82] which is depicted in Figure 3-1. The word "Triangular Routing" is routing which causes sending packets to a proxy system before sending to the intended destination. Both Mobile IP and Skype have this problem.

Thursday, March 22, 2012

MPLS LSPs VPN between PE

One thing to note is that with any VPWS (unlike a VPLS or IPLS), it is necessary for the end-points of the virtual private wires to be configured on the CE-devices, which must be capable of switching data on to the correct wire.  In terms of the criteria laid out in section 2, this means that a VPWS will generally require greater ongoing management effort from the VPN user than a VPLS or IPLS. 5.2.1 MPLS-based VPWS One of the simplest ways to create a VPWS is to use ATM or Frame Relay VCs between the PE devices and CE devices, and to cross-connect each of these to separate MPLS circuits (Label Switched Paths or LSPs) through the provider network, as illustrated in the diagram below.  Note that LSPs are uni-directional, and so two LSPs are required for each bi-directional connection. CE1 PE1CE3PE2PE3CE2VCs between the PEand CELSPs between PEdevicesThis is a relatively straightforward approach, and MPLS traffic engineering can be used to provide quality of service if this is required by the customer.  However, when used for multiple VPNs, it does not scale well in the provider network for the following reasons.     Firstly, each LSP through the provider network needs to be configured individually and then cross-connected to the specified VC at each end, which requires considerable management effort from the service provider.     Secondly, a large number of LSPs may be needed in the provider network, which uses large (and, compared with later solutions, wasteful) amounts of resource in the service provider's routers. 5.2.2 PWE3 VPWS An improvement on this approach is to use the PWE3 extensions to MPLS that are currently being standardized by the IETF in the PWE3 working group.   These extensions improve scalability by using a fixed number of MPLS LSPs VPN between PE devices in the provider network.  Emulated, point-to-point layer 2 connections (known as pseudo-wires or Martini pseudo-wires, after the author of the original draft) are then created between pairs of PE devices by tunneling through such an LSP. Copyright © 2003-2004 Data Connection Limited.  All Rights Reserved. Page 15 http://www.dataconnection.comThe signaling for these pseudo-wires is defined in draft-ietf-pwe3-control-protocol.  The encapsulation required for forwarding data across these pseudo-wires is defined for several layer 2 protocols, including ATM, Frame Relay and Ethernet (draft-ietf-pwe3-atm-encap, draft-ietf-pwe3-frame-relay and draft-ietf-pwe3-ethernet-encap). Therefore, an alternative to the MPLS based VPNs described above is to cross-connect layer 2 PE-CE connections with pseudo-wires using the appropriate layer 2 encapsulation.  Since each pseudo-wire only consumes resources in the PE devices, this is an improvement on the method described in 5.2.1, which also requires additional state in intermediate P devices.  

Wednesday, March 21, 2012

watch vpn proxy ABC’s

Growing viewership and buzz helped Kilar's independent position and the growth needed to be nurtured. On the other hand, lack of profits flowing back from Hulu meant that NBC and Fox could be increasingly concerned.  Viewers would be shifting online away from the TV Ads without increasing media conglomerates' bottom line in any way. This meant that they could put limits on the shows available or demand further compensation for the video. In addition, each of the major networks had their own websites that hosted content as well. Kilar also had to consider the rise of web2.0 sites. YouTube and similar sites had many more than 6 Billion video views across the world on a daily basis. Due to copyright restrictions, Hulu was only available in the US and the lack of active interactivity reduced its "stickiness" media content made advertisers more comfortable. Hulu was able to attract prime, blue-chip advertisers such as McDonald's, Bank of America and Best Buy. And finally, the publicity and buzz around Hulu was gratifying but media providers would quickly lose patience if they didn't see a sustained, viable revenue stream. The current ad model was lacking in substantial revenues despite Hulu's ad slots being full as of early 2009.  Kilar knew that 2009 would be a key year for Hulu. To solidify Hulu's independent branding, he approved an advertising campaign that debuted on Superbowl Sunday with the tagline "An evil plot to destroy the world. Enjoy." In April 2009, watch  vpn proxy ABC's parent company Walt Disney Co. joined Hulu as an equal equity partner giving a boost to the viability of Hulu as the main aggregator of premium online video.  Kilar wondered how Hulu should consider all the threats and opportunities that the dynamic and growing online video market provided. Given the limited dollar and human resources at his disposal, he needed to pick one of three paths below which would ensure that Hulu was independent, relevant, and profitable at the end of 2009 and in the years to come.

Tuesday, March 20, 2012

Netflix Indonesia VPN

With their current system, each facility fills approximately 98 percent of customer orders.  Orders that cannot be met by the nearest facility are passed on through time zones until they can be filled.  An estimated 84 percent of its rental library is available within a few days, making turn-around on titles very quick.11  Logistics are clearly an important factor in a model such as this.  Originally, all returns were checked-in and shelved before the new demands were met, making the first half of the day returns, the afternoon fulfillment.  However, by changing the procedure to simultaneously check in a movie and then match it to a new demand the process has streamlined substantially.  This system modification reduces shelf time on inventory has slowed Netflix  Indonesia VPN  hiring and reduced labor costs by about 15 percent.9   On average about 300 DVDs are unshipped from each facility at the end of the day, about 2 percent of the volume that flows through the center on an average day, and are stored in a small box at the facility.  Each week, any consistently unused inventory is returned to the main distribution center in San Jose for longer-term storage.4    Operational ComparisonsNo. of locations No. of employees No. of titles available No. of DVDs available Blockbuster, Inc.  8000+; 1 distribution center 89,000 About 1000 per location, up to 8,000 Hundreds Per Location Netflix 16distribution centers 381   13,500  3.3 Million Walmart.com 6distribution center Not available  12,000  Not available Table 2: Operational comparisons for the top three competitive DVD subscription services. Competition As with any successful business idea, Netflix has its imitators.  While there are many small online companies with a similar product, the two largest direct competitorsare well known: Wal-Mart and Blockbuster (Table 3).   

Monday, March 19, 2012

VPN for private addresses

Web Filter Multi-CPU Scaling ,With several backend enhancements, the Web Filtering engine (HTTP/S Proxy) of ASG now makes significantly ,better use of multiple CPU cores. Throughput and responsiveness is increased uniformly, with installations of all ,sizes experiencing a performance boost, especially on larger appliances. ,Improved Network Performance ,Using a new IRQ balancing system, the ASG will now better assign handling of network traffic to specific CPU ,cores. Benchmarks show improved network throughput on systems with multiple cores and fast NICs (1 & ,10Gb), such the ASG 625. ,Other Changes and Enhancements ,WebAdmin Console Clarification ,The physical console login (root prompt) screen will now reflect an information message that configuration ,should be done via WebAdmin and how to access it.  This is designed to aid first-time Astaro users who are ,(mistakenly) trying to login to the command line to begin configuration. ,Color Blindness Support for ASG Red/Green Buttons ,Throughout WebAdmin, the Red/Green toggle buttons have been enhanced with a mouseover tooltip which ,shows their status as text. This will assist those who have difficulty in determining the state of these controls ,only as color. ,Other IPv6 Additions ,The comprehensive IPv6 functionality has been enhanced by integrating it with even more areas of ASG:  , The IPv6 functionality of ASG now works with Mail Security (SMTP) , Full transparent HTTP mode now supports the use and rewriting of IPv6 addresses, preserving the ,originals after they are handled by the proxy. Note that as with IPv4, Full Transparent mode for the ,HTTP proxy is only available when ASG is running in bridged deployment mode , It is now possible to create ICMPv6 service definitions,

Sunday, March 18, 2012

VPAllocator VPN

Figure 5 shows the functional design of a VP admission controller and a VPG controlleraccording to our implementation. In this design, the VP admission controller includes twoobjects: a VC capacity allocator and a coordinator. The allocator receives requests from a VCconnection manager in the customer domain. The coordinator changes the capacity of the VPupon request from the VPG controller. It changes the capacity of the VP only when the bandwidth requirements of the active calls in the VP do not exceed the new capacity. The VPG controller includes four objects. The trigger object periodically initiates the VP capacity allocatorto run the VP allocation algorithm. The coordinator sends the new VP capacities to the coordinators of the associated VP admission controllers, using a synchronization protocol. Finally, anestimator object collects statistics from the VP admission controllers. This data is used by thecapacity allocator.Obviously, there exist many ways of realizing the above design, with respect to control algorithms, mechanisms for trigger realization, synchronization protocols, and centralized or distributed implementation of the controllers. For example, the control system may include oneVP admission controller per VP or one centralized controller for the whole VPN. The sameapplies for VPG control. Also, VP admission controllers can send bandwidth requests to VPGcontrollers, triggered by a pressure function, or a VPG controller can periodically recomputethe VP capacities and distribute them to VP admission controllers. Similarly, the synchronization protocols between the VP admission controller and the VPG controller can be realized indifferent ways. One possibility is that the VP admission controller, upon receiving a request tochange the VP size, checks whether the current utilization is above or below the new size. Ifthe utilization is below, the VP size is changed and a confirmation is sent to the coordinator ofthe VPG controller. If it is not below, the VP size remains the same and a failure reply is sentinstead. In another possible implementation, when the attempt for changing the VP size is notsuccessful, the VP admission controller waits and blocks further calls from being admitted.Then, the utilization of the VP can only be decreased, as calls can leave but no new calls areadmitted. When the utilization drops below the new size, the VP size is updated and the replysent to the VPG controller. A customer's choice for a specific design of the control system isbased upon its control objectives and requirements for the control system, which relate to system size, expected traffic and signalling load, efficiency of resource control and robustness of VC state VC CapAllocatorVP capCoordinatorchangeVC Request    VP Admission ControllerconfirmTrigger EstimatorVPG,VP    VP StatisticstopologyVPAllocator    VPG, VPVPG Controller   capacityCoordinator CapFigure 5  Functional model of a VP admission controller interacting with a VPG controller   capthe control system. In order to enable the realization of a large class of control objectives andcontrol schemes, we have designed a generic controller as one of the building blocks of a customer control system. This generic controller enables many interaction patterns among controllers and is constructed in a modular way.Figure 6 shows a functional model of the generic control

Saturday, March 17, 2012

VPN overall performance

2002; Hifn 2003; Wang et al. 2006). The main components include the cryptographicengines, 32-bit data bus, cryptochannels and PCI interface, in which each part isconnected to the others by a bidirectional data transfer path. The system architecturewas meant to establish a parallel computational array; however, the 32-bitbidirectional data bus and the PCI interface become bottlenecks of the data transfereciency. Because the bidirectional data bus performs both data read and writeoperations, bus contentions are inevitable and a tremendous amount of arbitrationsare needed. The data could still become congested along the data transfer path eventhough arbitrated. Moreover, the system specifies that the cryptochannels are incharge of the data transfer between the crypto engines and external memories via thePCI interface, so a complete data transfer path cannot be set up until onecryptochannel obtains control of the PCI interface and the designated crypto engineat the same time. Hence, data transfer latency is prolonged and the overall systemperformance with this architecture is severely degraded. Furthermore, a cryptochannel works as a subcontroller which controls the crypto engines from the dataimport stage to data processing until the processed data is exported; thus, thenumber of parallel processing tasks is limited by the number of cryptochannels,which significantly degrades the overall performance and system extensibility. Thearchitecture can be improved by changing the critical data transfer path in the databus and the PCI interface using a pipeline methodology by reducing cryptochannelsfrom subcontrollers to DMA arrays. As shown in Figure 2(b), the optimised systemdata transfer path is changed from a bidirectional 32-bit bus to dual one-way 64-bitdata buses to significantly reduce data congestion and arbitration. One-way DMAarrays are implemented to work with one-way data buses, including config directmemory access (CDMA), write direct memory access (WDMA) and read directmemory access (RDMA) arrays that transfer configuration and data information,respectively. Furthermore, a five-stage-pipeline is implemented through the datatransfer path to improve the usage eciency of the PCI-X interface and increase thedata transfer rate. These changes greatly enhance the data transfer eciency and

Thursday, March 15, 2012

Erasmus MC has a higly restricted VPN

There are several types of saved connections:- Erasmus MC has a higly restricted VPN portal, the default for most aims;- because of problems with several resources, there also is a special alternatieve route- Erasmus MC also has an SMS/Citrix connection for employees working with patient data from home;- Erasmus University Rotterdam has the MyEUR/ERNA-VPN portal for students and Erasmus MC employees with a teaching task.The VPN portals are connections to the network of Erasmus MC or EUR through a kind of tunnel in the network of the home internet provider. When you order information from a logged-in computer to a provider, the IP address is enclosed. For the information provider the requesting computer seems to be in the network of the employer, and gives access to that information (if, at least, there is a licence agreement).In the Citrix connection the computer really is in the network of the employer, but that computer is operated remotely, using the monitor, keyboard and mouse of the remote pc. The remote computer only functions for the connection, and cannot be accessed otherwise. A drawback is that files are downloaded to the network computer in Erasmus MC, and not to your home pc. To use the file, you must send it to yourself in an e-mail attachment. Not very skilful.The 'normal' VPN tunnel connection of Erasmus MC gives troubles when using several servers: our OPAC (catalogue with access to hundreds of e-books), anatomy atlas (Primal Pictures). When accessing byInternet Explorer 9 with Windows Vista or Wondows 7, or Safari with Apple/iMac there are even problems in using PubMed.These problems can be prevented in several ways:- via the MyEUR/ERNA-VPN portal (for employees with a teaching task),- via the Erasmus MC SMS/Citrix connection (not handy),- via the special alternatieve route in the normal VPN-menu of Erasmus MC,- use, in stead of Internet Explorer 9 or Safari: Mozilla Firefox or Google Chrome, eventually in combination with the alternatieve route.

Individuals may judge VPN

Individuals may judge their capabilities in comparisonwith others. Bandura (1977, 1986) suggests thatexpectations of personal e� cacy derive from foursources of information: performance accomplishments,vicarious experience, verbal persuasion and emotionalarousal.Self-e� cacy is assumed to have three components:magnitudeÐthe levels of task di� culty that peoplebelieve they can attain; strengthÐthe convictionregarding magnitude; and generalityÐthe degree towhich the expectation is generalized across situations.In assessing these components, the purpose is todiscover the type of questions that will best explainand predict someone's dispositions, intentions, andactions. Self-e� cacy is a dynamic construct thatchanges over time as new information and experiencesare acquired.It has been found that perceived task abilitysigni®cantly aŒects performance even after controllingfor other variables (Mentro et al. 1980). Self-e� cacy isalso suggested to improve skills (Gist 1987). Individuals with moderate to high self-e� cacy tend toengage more frequently in task-related activities andpersist longer in coping eŒorts. This leads to moremastery experiences, which in turn enhance selfe� cacy. Those with low self-e� cacy tend to engagein fewer challenging eŒorts; they give up more easilyunder adversity and evidence less mastery, which inturn reinforces their low self-e� cacy (Bandura 1977,Bandura and Schunk 1981, Bandura 1982).

Wednesday, March 14, 2012

Partially Meshed, Fully Meshed, Distributed, and Hub-and-Spoke Networks

Partially Meshed, Fully Meshed, Distributed, and Hub-and-Spoke Networks
When overlaying VPNs on any network topology, many factors affect the scalability and performance of the network. Some
of these factors include encrypted versus clear traffic processing, hardware acceleration versus software IPSec, configuration
complexity, high availability, related security features (firewall, IDS, and so on), the number of routing peers and networks
to track, and maintaining QoS. Fully meshed networks quickly run into scalability constraints because every device in theCisco Systems
 
network must communicate with every other device in the network via a unique IPSec tunnel. That is n(n - 1)/2 tunnels for
a 50-node network, or 1225 tunnels! The configuration complexity is immense, and at some point growing the size of the
mesh will not be possible. Keeping state for that many tunnels also has performance implications. Partially meshed networks
scale better than fully meshed because inter-spoke connections are established only as needed. Similar to devices in fully
meshed networks, the limiting factor in this topology is the number of tunnels that the devices can support at a reasonable
CPU utilization. Both of these networks could use a dynamic tunnel endpoint discovery mechanism to simplify the
configuration and increase scalability. However, as documented in the caveats section, these networks are not covered in this
document.
Hub-and-spoke networks scale better because the headend hub site can expand to meet growing spoke capacity
requirements. Low-horsepower spokes that need connectivity to other remote sites will be able to connect via the hub site.
However, all traffic flows through the hub site, and this setup requires significant bandwidth because it includes all
spoke-to-spoke traffic as well as spoke-to-hub traffic. Not all headend VPN devices support spoke-to-spoke
intercommunication. Split tunneling may be required at remote sites, depending on the type of device chosen at the headend.
For instance, the model for firewalls is to enable split tunneling at all sites, thus eliminating the need for the hub firewall to
process spoke-to-spoke traffic. If there are regional or other requirements for traffic routing where most traffic does not
require access to networks via the hub site, consider a distribution layer to lower the bandwidth requirements at the headend
and thus increase the scalability of the network

Split Tunneling VPN

Split Tunneling
Split tunneling occurs when a remote VPN user or site is allowed to access a public network (the Internet) at the same time
that he/she accesses the private VPN network without placing the public network traffic inside the tunnel first. If split
tunneling were disabled, the remote VPN user or site would need to pass all traffic through the VPN headend, where it could
be decrypted and inspected before being sent out to the public network in the clear. For example, a remote-access user who
dials his/her local Internet service provider (ISP) and connects to corporate over an IPSec client has two options. The first has
the user passing only corporate-bound data over the VPN connection. Browsing the Web would occur directly through his/
her ISP. The second option has the user passing all traffic (including Internet traffic) to the headend first, where it is then
routed in the clear either to the corporate network or out to the Internet. Deciding between the two technologies often
depends on the amount of trust you can place in the remote sites or users. To increase the level of trust for these users,
consider using additional available security technologies, such as personal firewall or virus scanning. Remote sites that wish
to utilize split tunneling should have a stateful firewall on their premises to control the cleartext traffic allowed into and out
of the remote site. Likewise, a remote user should run a personal firewall to filter traffic and carry out virus scanning while
the VPN is connected and when the VPN is not. Even when split tunneling is disabled, a personal firewall is often necessary
because the user is not always connected over the VPN. A traveling user may connect in through high-speed Internet access
in a hotel and elect to browse the Web while not connected to the corporation. Without a personal firewall, that system is
open to attack whenever it is not connected to the VPN.
Similarly, many hardware VPN devices utilize NAT and market it as a form of firewalling. In the authors' opinion, NAT is
not a security feature and should not be deployed as such. Even though addresses are hidden, no packet filtering or
sequence-number checking is occurring, leaving systems protected by NAT open to brute-force attacks against them. A
security perimeter that relies solely on NAT is indeed not a security perimeter. When utilizing these devices, it is important
that you provide a personal firewall for the PCs residing behind the device. Even if split tunneling were disabled, a personal
firewall will be necessary if that host is mobile (as in the case of a laptop).
When considering the security risks of enabling split tunneling, it is too easy to conclude that it should never be considered.
Actually, disallowing split tunneling creates an enormous load on the VPN headend because all Internet-bound traffic needs
to travel across the WAN bandwidth of the headend twice. This use of WAN resources is not an optimal one, and it often
leads to the decision to implement the appropriate security technologies at the remote sites to allow split tunneling to occur.
In SAFE VPN, remote sites were assumed to have split tunneling enabled unless otherwise specified. If split tunneling were
disabled, the designs would not change, but the performance and scaling considerations might change slightly because of the
increased traffic load on the headend.

Monday, March 12, 2012

VPN gateway and theenterprise VPN

A tunnel, normally referred to as a LAN-to-LANtunnel, between the network VPN gateway and theenterprise VPN gateway carries packets destined tosubnet IP address 192.168.3.0/24. Note that in theexample shown in Figure 10, the hosts behind tunnelB at the IPSec client are specified as subnets192.168.3.0/24 and 192.168.1.0/24, while the hostsbehind tunnel C at the network VPN gateway arespecified only as subnet 192.168.3.0/24. This meansthat, although packets destined to both subnets aresent by the client through the network tunnel, onlypackets destined to subnet 192.168.3.0/24 are sent bythe network VPN gateway through the LAN-to-LANtunnel. Packets destined to subnet 192.168.1.0/24 arerouted directly over other routes.The front-end graphical user interface (GUI) forthe Lucent IPSec client has not been changed, but theback-end processing when a user initiates an IPSectunnel has been modified as follows. The user nowmust configure only the IP address of the enterprisetunnel. When the user initiates an IPSec tunnel tothe enterprise gateway at IP address 135.180.144.254(see Figure 10), an enterprise tunnel will be established as described earlier, but when policy information (e.g., local presence IP addresses and IP addressesof hosts behind the enterprise tunnel) is downloaded,the IP address of the network VPN gateway and the IPaddresses of the hosts behind the network tunnel aredownloaded as well. The SA database is then populated with this information. The IPSec tunnel to thenetwork VPN gateway at IP address 135.180.244.150is then initiated automatically. Thus, an enterprise hasthe flexibility to determine the policy information fora network tunnel even before the tunnel is initiated.Any policy information that may subsequently beprovided by the network gateway during IKE negotiation is ignored, so there is no backdoor mechanismthat makes it possible to override the policy set by theenterprise for the network tunnel. Furthermore, theenterprise tunnel is also used to download preconfigured keys for use by the network tunnel during IKEphase 1 negotiations. Therefore, the user need onlyconfigure the pre-configured keys for the enterprisetunnel. This is also the case if preconfigured certifi-cates are used instead of preconfigured keys.