Ct043-3-2 - Remote Access Network: Asia Pacific University College of Technology & Innovation
Ct043-3-2 - Remote Access Network: Asia Pacific University College of Technology & Innovation
Ct043-3-2 - Remote Access Network: Asia Pacific University College of Technology & Innovation
Table of Contents
Introduction.........................................................................................................................................................4
Primary Link.........................................................................................................................................................5
Secondary Link.....................................................................................................................................................6
DMVPN Overview............................................................................................................................................6
Overview desgin of the WAN...............................................................................................................................7
Description of technology used (DMVPN).......................................................................................................8
Dual DMVPN Cloud Topology..........................................................................................................................9
Technical description and operational requirement........................................................................................9
Process........................................................................................................................................................9
Advantages and Disadvantages of DMVPN....................................................................................................10
Advantages................................................................................................................................................10
Disadvantages............................................................................................................................................10
DMVPN Applications......................................................................................................................................11
Compare between the differences of DMVPN and Easy VPN........................................................................12
Standards and protocols................................................................................................................................13
DMVPN protocols......................................................................................................................................13
Overview and Recommendations..................................................................................................................15
Headquarter Office and Branches Secondary Link Recommendation.......................................................15
Secondary Link backup plan..........................................................................................................................16
Purpose of the Plan...................................................................................................................................16
Recoverability............................................................................................................................................17
Redundancy Requirements........................................................................................................................17
Hardware and software.....................................................................................................................................19
The overview of leased lines hardware.........................................................................................................19
The head quarter office lease line modem....................................................................................................19
ASMi-52........................................................................................................................................................19
LLM 1100.....................................................................................................................................................21
The ISDN hardware overview........................................................................................................................22
The Headquarter office Router......................................................................................................................24
Abstract
In this document it provides the Wide Area Network design tools and its architecture that
would be governed the network layout for that would be implemented for the MCRM Bank. The
document describes WAN architecture that contains both primary link and secondary link.
On both primary and secondary link, their protocols are being elaborated so as to meet the required
link technology characteristics and their advantages and disadvantages over other protocols.
Furthermore, different necessary WAN devices are being described for both primary and secondary
link that would be applied for their connection. Also for each of the links there contains security
measures that would be employed to secure the WAN system since the banking system requires
secured connection as to protect network vulnerability.
Chapter 1
Introduction
MCRM Bank Berhad started its humble beginnings in 2005 in Malaysia operating in 5 branches
including the main office (HQ). It was incorporated on 31 May 2005 and commenced operations on
12 December 2006. In January 2007, MCRM Bank was listed on the Kuala Lumpur Stock Exchange.
In 2009, the finance Bank business of MCRM bank Berhad was enlarged; merged entity has over
planes to increase branches in Malaysia.
Today, as a new bank, it is the large financial service group in Malaysia. Its extensive products and
services include commercial banking, investment banking, Islamic banking and Internet banking.
Headquartered in Malaysia with 4 branch offices in Malaysia MCRM bank has a strong market
position and well-recognized business franchise.
The team assigned to come with WAN network that connect all the branches together with the
headquarter including the equipment needed as well as the software involve to configure the
connection together with the protocols needed to keep the connections secure from outside attackers.
The following chapters is fully illustrate the flow of connection and the overview design considering
the primary link as well as the secondary link.
Chapter 2
Assumption and the proposed solution
Primary Link:
Chapter 3
Secondary Link:
DMVPN Overview
D
MVPN is a simple, secure, low cost, scalable VPN-Tunnel. DMVPN supports
distributed applications including: data, voice, and video, with QoS. All of this can
be done in a secure IPSec VPN tunnel over an Internet connection. The only change
is the IP address of the GRE Tunnel. The spoke uses dynamic discovery of IPSec
tunnel end-points, (other spokes). No IPSec static configuration for each spoke. It’s
also considered as cost effective and secure communication for branch offices.
Because DMVPN (Hub-and-Spoke) supports multipoint GRE tunneling you can run VoIP, Video,
and Multicast services across your secure DMVPN link. (Cisco DMVPN, August 5, 2)
Figure (2.1)
Cited: http://ibrainlesgenius.files.wordpress.com/2009/08/dmvpn.jpg
Using of Dynamic Multipoint Virtual Privet network (DMVPN) that provided by Cisco to support the
secondary link of the network. DMVPN combines the existing capabilities of multipoint Generic
Routing Encapsulation (mGRE) tunnels, Next Hop Resolution Protocol (NHRP), and IPSec
encryption to provide a Hub and Spoke VPN infrastructure.
Quality of Service is enabled for DMVPN tunnel access traffic by utilizing the QoS for VPN feature
of Cisco IOS. QoS for VPN enables classification of packets entering a VPN tunnel prior to
encryption and encapsulation, also known as pre-classification. QoS for VPN is applied to the
DMVPN tunnel interface of all Hub and Spoke routers to enable QoS throughout the enterprise.
DMVPN is a digital service that allows sending and receiving voice, data and video at a faster speed
and higher quality as compared to normal telephone line. It is a proven high quality and reliable
service as well as cost-effective solution to enable users to use advanced applications like Internet
access, data transfer, and video conferencing while maintaining connectivity with traditional
telephone services.
When the primary link is either inaccessible or highly congested to above fifty percent of the
available bandwidth, then the secondary link will be activated through dial demand routing (DDR)
technique set in all routers in the entire network. The secondary link will always keep Bank
headquarters and branches connected to each others.
There is also one segment called Demilitarized Zone (DMZ Zone). DMZ Zone is a segment of
a network that separated from the other subnet in order to protect the internal network when there is
an intrusion. Hosts in the DMZ have limited connectivity to specific hosts in the internal network,
though communication with other hosts in the DMZ and to the external network is allowed. It is can
be said in a simple way, when there is an intruder come in and intends to hack the server in will
directly point to this server (Proxy Server) which is isolated from the internal zone (main network).
Therefore, the main network (internal zone) remains safe.
The public address of branches routers can be assign automatically using dynamical-assigned IP
address as well as it can be statically defined, thus , the connection is fully secured because this
address are registered with the headend, which provides a mapping to the branch private address.
Headend sites are typically connected with DS3, OC3, or even OC12 bandwidth, while branch offices
may be connected by fractional T1, T1, E1, T3, or increasingly, broadband DSL or cable access.
Branches router should have two or more tunnels to the campus headends in order to provide
redundancy. These headend routers can be geographically separated or co-located. For maximum
protection, both headend and site redundancy should be implemented. This design focuses on the dual
DMVPN cloud topology, with both a hub-and-spoke deployment model and backup plan.
Each deployment model in a dual DMVPN cloud topology has three control planes: the IPsec control
plane, the Generic Routing Encapsulation (GRE) control plane, and the routing control plane. Which
headend system architecture is chosen determines how each of the control planes is implemented.
Dual hub-dual DMVPN cloud is the topology used in this design in order to implement the network
traffic, where dual topology allows the network manager greater control over path selection than in a
single topology. In addition, the primary failover method is a dynamic routing protocol.
The hub-and-spoke deployment model is the most common deployment model. This model is the
most scalable, and predominately mimics traditional Layer 2 leased line, Frame Relay and ATM hub-
and-spoke networks. The headend is configured with a multipoint GRE (mGRE) interface, and the
branch with a point-to-point (p2p) GRE interface.
Having high availability DMVPN designed as a primary and secondary links to be configured
between each branch-end device and the headends. Under normal operating conditions, both the
primary and secondary tunnels are established. The routing protocol, such as EIGRP, maintains both
routes, with the secondary tunnel being configured as a less preferred route. This allows branch-end
devices to converge to a secondary headend without user intervention, in the event of a failure at one
head-end device. (Data-only Site-to-Site IPSec VPN Design Guide \ Cisco Systems, 2009)
IP multicast is supported.
Dynamic IGP routing protocols over the VPN tunnel are supported.
Supported on all Cisco IOS router platforms (some limitations on high-end router platforms).
Distribution of IPsec tunnels to headend routers is deterministic, with routing metrics and
convergence choosing the best path.
All primary and secondary/backup DMVPN tunnels are pre-established, such that a new
tunnel does not have to be established in the event of a failure scenario.
Configuration of both IPsec and mGRE is dynamic, which simplifies and shortens
configurations on the headend only. Provisioning of new branch offices can be done without a
configuration change/addition to the headend router(s).
· Simplified and smaller configurations for hub and spoke
· Zero-touch provisioning for adding new spokes to the VPN
Disadvantages
DMVPN hub-and-spoke topology designs have the following disadvantages:
DMVPN Applications
Table 2.1: States the applications involved in DMVPN
Application Description
Enable the connected point to access the internet for lower cost
Access the Internet
than individual dedicated line
DMVPN using protocols EIGRP or OSPF in between the spokes and the main hub which are
commonly used for further scalability as well its using the IP protocol to enable internet connection
through the secondary link:
IP is a layer 3 internetworking protocol used for routing of datagram through gateways connecting
networks and sub networks. It is a datagram-oriented protocol which treats each packet
independently. This means that each packet must contain complete addressing information.
Also, IP makes no attempt to determine if packets reach their destination or to take corrective action
if they do not as well as doesn’t do the checksum of the contents of a packet, only the IP header. The
datagram can travel along different routes and can arrive out of sequence or be duplicated.
o Addressing. IP headers contain 32-bit addresses which identify the sending and receiving
hosts. These addresses are used by intermediate routers to select a path through the network
for the packet.
o Fragmentation. IP packets may be split, or fragmented, into smaller packets. This permits a
large packet to travel across a network which can only handle smaller packets. IP fragments
and reassembles packets transparently.
o Packet timeouts. Each IP packet contains a Time to Live (TTL) field, which is decremented
every time a router handles the packet. If TTL reaches zero, the packet is discarded,
preventing packets from running in circles forever and flooding a network.
o Type of Service. IP supports traffic prioritization by allowing packets to be labeled with an
abstract type of service.
o Options. IP provides several optional features, allowing a packet's sender to set requirements
on the path it takes through the network (source routing), trace the route a packet takes
(record route), and label packets with security features. (IP Protocol Overview, 2003)
Task Description
The bank network use the secondary link along with DMVPN
services in order to update the offsite back up source with mirror
Link usage
image of the primary link transactions, because of its flexible,
highly reliability as well as the usability.
Service line E1 carrier technologies used because of fixed bandwidth,
dependent upon the technology. Bandwidth is constant and is
DMVPN it’s providing a backup support while the headquarters can connect to the offsite back up
source in case of system or network failure over the internet links which also provide recoverability
and data redundancy. (Cisco Dynamic Multipoint VPN, 2009 Cisco Systems)
It means that when the primary like failover the secondary link will automatically take-off all the
network operation because primary link is working consistently with the secondary so in case of
network failure the backup connection will take over the transmissions without any side effect such as
transmission delay or loss of data till the primary link in maintaining.
Recoverability
“The information stored on servers is the lifeblood of the company. Losing mission-critical
information can be devastating. Therefore, keeping data properly backed up is a key element of a
network’s recoverability” by WestNet, 1999.
The team has proposed a recovery plan that includes the following:
Technological and automated procedure as a component of the system that copies all files on a
regular basis in a media such as Digital Audio Tape (DAT) which has a storage capability of
many gigabyte.
Secure on-site storage that can protect backup media in the event of any accident such as fire,
flood. That can be stored in storage box then well flow back to the offside backup which is
located in the HQ.
Secure off-site storage to preserve backups even after the total destruction of the original
building. It is advised for the bank to get service of companies that offer frequently replication
of data at a secure storage facility such as DataBank *.
Redundancy Requirements
In order to facilitate all functions of the Bank without disturbance by the network when any portion
gets down. The Bank is required to have redundant network paths. Therefore, the traffic is rerouted.
Redundancy would be built into the network by adding a second intermediate switch and all the other
switches in the building will be connected to that intermediate switch.
“The advantage of adding the intermediate switch is that it creates a foundation for greater network
expansion. Often these intermediate switches are modular chassis-based, which allows additional
modules to be added for future growth and technologies” (Michael & Robert 2003,p. 514.)
Figure (2.3)
Illustrate the flow of data through the secondary tunnel in case of the primary link failed
Using of T1 in the first end of the network that allocated in HQ where we need very high speed to
connect to all the branches because it’s usually receive large amount of data flowing to the main base
as well as the head quarter need to fill-full all the needed requisites form other branches and avoid the
overload of connection issue.
In the branch side we are using feature of VDSL which provide high connection speed like 52 Mbps
for downstream and 1.5 to 2.3 Mbps for upstream the reason why we have suggest this kind of
connection is that the branches need to acknowledge the transaction connections so fast to be adapted
with the out-world-market and business hours its makes very big different if there is delay in
submitting the transactions on time.
Chapter 4
Hardware and software
The overview of leased lines hardware
To establish the leased line service we will use dedicated telephone connection between two points
that is set up for the MCRM bank headquarter office to the ISP’s router by a telecommunications
common carrier (v.35 serial line). To synchronize the signal we need two modems in between the
routers. One is in the office and the other one is in the ISP side and must be compatible to each other.
Data rates 2.3 Mbps over 2-wire and 4.6 Full-duplex rates from
Mbps over 4-wire 32, 56, 64, 128, or 144 kbps
Source: http://www.rad-direct.com/datasheet/ASMi-52.pdf
Source: http://www.patton.com/datasheet/1082_datasheet.pdf
Source: http://www.rad.com/10/Sync_Async_Short_Range_Modem/2863/
Source: http://www.data-linc.net/pdffiles/manuals/LLM1100.pdf
RAD ASM-10/8
LLM 1100
Data rates 2.4 kbps to 19.2 kbps 300, 600, or 1200 baud half or
full duplex
Up to 1200 baud simplex.
As the picture indicates minimal ISDN hardware must be set up to allow connection between two
stations such as computers. The incoming twisted pair enters a Telco-provided box called the network
terminator (NT1), which breaks the 144 Kbps channel into the two B and single D sub channels.
Source: http://mckerracher.org/isdn/#Introduction
Component Description
Terminal Equipment (TE) End device in the ISDN link.
Terminal Equipment (TE1) ISDN native equipment which accesses
ISDN communication directly. Example;
fax machines and desk phones.
Terminal Equipment (TE2) None ISDN equipment which requires a
terminal adapter (TA) to establish an
ISDN connection.
Terminal adapter (TA) Provides non ISDN devices access to the
ISDN link.
Network Termination (NT1) Equipment for terminating the ISDN
signal at the end system. Example a
multiplexer.
Network Termination (NT2) Equipment used for
switching/transporting the ISDN signal to
the TE1
Reference points within an ISDN loop R: The link between a TA and any other
unrelated equipment.
Router comparison
Technical description and comparison of routers for the head quarter office
Source: http://www.tribecaexpress.com/images/cisco_2800_series.jpg
Source: http://www.geminiit.co.uk/images/j2350.gif
Module Description
T3/E3 ATM Network Modules ATM Forum UNI 3.1/4.0 PVC compliant
Next Hop Routing Protocol (NHRP
Cisco
Permanent Virtual Circuits (PVCs) and
Switched Virtual Circuits (SVCs)
Dual-port Channelized T1/E1 PIM Dual ports
Fully integrated CSU/DSU
Juniper
Full, fractional and channelized
T1/E1 capabilities
Technology supported Ethernet, Fast Ethernet, ISDN T1, E1, Fast Ethernet,
PRI Synchronous Serial, ISDN
BRI, ADSL2/ADSL2+,
G.SHDSL, DS3, E3, Gigabit
Ethernet interfaces
RAM capacity 256 MB of DRAM memory GB DRAM 256 / 512
Maximum: 1 GB
800 Mbps
aggregate throughput)
Cable specification
The next step in setting up a network system is the selection of the cables. There are many different
serial cables with seemingly similar features, and finding the correct cable can be a challenge. Below
is the justification for the cables use in the primary and secondary link.
We are using the existing telephone line cable called public switched telephone network (PSTN) to
connect the leased line modem in primary link and ISDN/PRI in secondary link. It is the collection of
interconnected systems operated by the various telephone companies and administrations (telcos and
PTTs) around the world and it also known as the Plain Old Telephone System (POTS). (Golenewski,
2001)
Today the PSTN is almost entirely digital.The signal coming out of the phone set is analogue. It is
usually transmitted over a twisted pair cable still as an analogue signal. At the telco office this
analogue signal is usually digitised, using 8000 samples per second and 8 bits per sample, yielding a
64 kb/s data stream (DS0). Several such data streams are usually combined into a fatter stream.
Within the ISDN connection twisted pair cable is used as traditional analog subscriber lines The
PSTN is largely governed by technical standards created by the ITU-T, and uses E.163/E.164
addresses. (Horak, 2000)
This serial cable is chosen to connect the router to the modem to establish the leased line connection
in primary link. There are a lot of types of serial cable including EIA/TIA-232, X.21, V.35, EIA/TIA-
449, EIA-530, and EIA-613 HSSI. A number of different standards define the signaling over a serial
cable and specifies the connector.
V.35 serial cables connector classified by the number of their pin and gender. We can define what
kind of connector we should use by looking at the interface provided by the router for the head
quarter router it has 15 pin which means that we have to use the db-15
The following illustration shows serial cable CAB-E1-DB15= (part number CAB-E1-DB15), which
is compatible in the Cisco 3725 PRI bundle seriesThis cable has a male DB-15 connector on the
Cisco end and a DB-15 connector on the leased line modem. Unlike the head quarter the branch
office Cisco 2691 series router requires the DB-60 connector.
Source: http://www.visc.vn/pictures_products/wqm1248863268.JPG
CAB-V35MC
The next figure shows serial cable CAB-V35MC, which is used in the branch office Cisco 2691
router to connect with RAD asm-20 modem. This cable has a male DB-60 connector on the Cisco end
and a male DB-15 on the modem.
Source: http://www.alliancedatacom.com/images/h5697.gif
Recommended Hardware
Headquarter Office
In the face of Juniper and Cisco being two vendors which provide high quality networking hardware,
Cisco has more advantages valuable to increasing best and affordable solution for the MCRM bank
WAN connection.
The Cisco PRI bundle 3725 series will deployed at the head quarter office, because it provide the
efficiency use of the integrated interfaces as it supports both leased line and DMVPN. Instead of
buying the network module separately from the router, hence it reduces implementation cost.
For the primary link we suggest to use the RAD ASM-40 modem due to its wide range of
compatibilities meanwhile increases network performance instead of using the router built in modem
which would highly reduce the throughput of the entire network.
Branch Office
As mentioned above Cisco is one of the good vendors in providing hardware, for the branch office we
also recommend to use the Cisco 2691 router with Cisco Network module, unlike the 3725 bundle
series. Comparing to Juniper 4350 which also need network module embedded, Cisco offers higher
efficiency in manageability and cost.
As the primary link connection we recommend to use RAD ASM-20 modem, because of its range,
higher data rates and effective in cost. As we know the modem in branch office might be far from the
nearest office, so that we need a modem with wide range.
Chapter 5
Security Measures
PILLARS OF BANK NETWORK SECURITY
Nowadays, Internet is an increasingly dangerous place, particularly as network attacks have
evolved from a hacker’s hobby to a sophisticated and lucrative business. Well-defended banks
typically install all three pillars of security when they construct their network defenses
FIREWALL
Firewalls selectively block network and Internet traffic. For example, if FTP sites are off
limits to your institution, your firewall can be configured to block access to the FTP port. You could
also block the employee from opening mail by block the traffic from the mail sites itself. Firewalls
INTRUSION DETECTION
Next pillar of network security is Intrusion Detection Systems (IDS). This IDS looking for
intrusions in process (e.g. accessing forbidden sites) or viruses/worms such as ‘Trojan Horse’ attempt
to gain access to control. The IDS will records for each dangerous pattern and alerts the network
security personnel. However, network security personnel must be carefully configured the IDS to
send alerts only on dangerous traffic. The IDS are unable to stop troublesome network traffic.
Someone must review the attack information and attempt to block it.
INTRUSION PREVENTION
Intrusion Prevention System (IPS) is the combination of firewall and Intrusion Detection
System technology. IPS watch the network traffic like IDS and determining which one should be
permitted any given traffic like firewall. IPS stops the attack by blocking traffic between the attacker
and the victims unlike IDS which can only note ongoing attack and pass the alert to the analyst. A
properly tuned IPS is incomparable defense against network based attacks.
TECHNIQUES
Virtual Private Network (DMVPN)
TYPES OF DMVPN
Table 4.1:
Involving a single DMVPN gateway. Other party involved in negotiating the secure
communication channel with DMVPN gateway is a PC or Laptops that connect to the internet
and running DMVPN Client software. DMVPN Client allows telecommuters and travelling users
to communicate on the central network and access servers from many different locations. Benefit
of this DMVPN type is significant cost savings by reducing the burden of long distance charges
associated with dial-up access. Also helps increase productivity and peace of mind by ensuring
secure network access regardless of where an employee physically is.
Table 4.2:
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables the secure transfer
of data from a remote client to a private enterprise server by creating a virtual private network
(DMVPN) across TCP/IP-based data networks. PPTP supports on-demand, multi-protocol,
virtual private networking over public networks, such as the Internet.
PPTP-based Internet remote access DMVPNs are by far the most common form of PPTP
DMVPN. In this environment, DMVPN tunnels are created via the following two-step process:
1. The PPTP client connects to their ISP using PPP dial-up networking (traditional modem).
2. via the broker device (described earlier), PPTP creates a TCP control connection between the
DMVPN client and DMVPN server to establish a tunnel. PPTP uses TCP port 1723 for these
connections.
PPTP also supports DMVPN connectivity via a LAN. ISP connections are not required in this
case, so tunnels can be created directly as in Step 2 above.
Once the DMVPN tunnel is established, PPTP supports two types of information flow:
Control- messages for managing and eventually tearing down the DMVPN connection.
Control messages pass directly between DMVPN client and server.
Data- packets that pass through the tunnel, to or from the DMVPN client
One drawback of PPTP is its failure to choose a single standard for authentication and encryption.
Two products that both fully comply with the PPTP specification may be totally incompatible with
each other if they encrypt data differently, for example. Concerns also persist over the questionable
level of security PPTP provides compared to alternatives.
Site-To-Site DMVPN
Site-to-site is similar as point-to-point except there is no dedicated line in use. Each site has its own
internet connection which may not be from the same ISP or even the same type. One may have a T1
while the other only has DSL. Unlike point-to-point, the routers at both ends do all the work. They do
all the routing and encryption. This is an easy way to connect two offices without having each user
dial-up using a PPTP connection. Site-to-site DMVPNs can work with hardware or firewall devices.
On the software side, you can use something like ‘Clarkconnect’. On the hardware side, you can have
many different devices to choose from. The site to site DMVPN solutions provide security at the
same time being affordable. It provides broadband connection via internet. It also meets WAN
requirements apart from adding cheer to many businesses. It delivers reliable transport for complex
mission-critical traffic, such as voice and client-server applications, without compromising
communications quality.
Point-To-Point DMVPN
Another site to site DMVPN is a point-to-point. Simply put, two or more networks are connected
using a dedicated line from an ISP. These are usually T1's, Metro Ethernet, or OC lines. The main
strength of using a leased line is that is a circuit-based point-to-point connection. It does not go out
over the public Internet, so there performance is not degraded by routing problems, latency, and
external congestion. A physical loop of wire or fiber must be used to connect the destinations.
However, these are true point-to-point connections the maximum throughput can usually be achieved.
Meaning, a T1 passes data at a full 1.54 Mbps.
PROTOCOLS
IPSec
IPSec is the most dominant protocol for secure DMVPNs. IPSec (IP Security Protocol) provides
encrypted security services. These services enable authentication, as well as for access and
trustworthiness control. IPSec provides similar services as SSL, but it works on a network layer.
Through IPSec you can create encrypted tunnels (DMVPN) or encrypt traffic between two hosts.
Point-to-Point Tunnelling Protocol (PPTP)
PPTP is a set of communication rules that allows corporations to extend their own corporate network
through private ‘tunnels’ over the public Internet. Effectively, a corporation uses a wide-area network
as a single large local area network. A Bank no longer needs to lease its own lines for wide-area
communication but can securely use the public networks. This kind of interconnection is known as a
virtual private network (DMVPN). Point-to-Point Tunnelling Protocol is used to ensure that
messages transmitted from one DMVPN node to another are secure. With PPTP, users can dial in to
their corporate network via the Internet. PPTP uses TCP port 1723 for its control connection and
GRE (IP protocol 47) for the PPP data. PPTP supports data encryption by using MPPE. PPTP made
by: Point-to-Point Protocol (PPP), Authentication Protocols (PAP, CHAP, MS-CHAP v1, MS-CHAP
v2),Microsoft Point-To-Point Encryption (MPPE), Generic Routing Encapsulation (GRE)
Layer Two Tunnelling Protocol (L2TP)
The Layer 2 Tunnelling Protocol (L2TP) was developed by combining features of PPTP with Layer 2
Forwarding (L2F) protocol. One of the advantage of L2TP over PPTP is that it can be used on non-IP
networks such as ATM, frame relay and X.25. Like PPTP, L2TP operates at the data link layer of the
OSI networking model. L2TP DMVPNs are supported by many major firewall products, including
ISA Server, CheckPoint, Cisco PIX, and WatchGuard.
Secure Socket Layer (SSL)
Secure Socket Layer is a form of DMVPN that can be used with a standard Web browser. In contrast
to the traditional Internet Protocol Security (IPSec) DMVPN, an SSL does not require the installation
of specialized client software on the end user's computer. It's used to give remote users with access to
Web applications, client/server applications and internal network connections.
Chapter 6
Limitations
In this documentation we have faced some difficulties with technical terms used in both hardware and
software specification, selecting appropriate devices among the best available multivendor to provide
a WAN solution for our customer, MCRM Bank.
In addition there is no enough resources that supporting to find about the latest technology to be able
to implement it along in this assignment as well the time period that is totally not enough to come up
with such a project, I believe that if we had more time to do this tasks we will perform much better
because that give us the ability to research and schedule the time properly.
Cancelation
We have acquired both technical skills and different WAN theories from this assignment. However,
we did intensive researches as in the process of solving the assignment problem. In due search we
have developed strong understanding on WAN connection technologies, Protocols, different
techniques for securing WAN link against unauthorized users and other intruders.
Furthermore, we have also mastered the procedures for developing and deploying a WAN connection
solution by considering factors such as cost of implementation, availability of services, manageability
of services, hardware and software, access control, bandwidth required, traffic prioritization and
security for the data across the public infrastructure along with the hardware and software selection to
suite the office requirements.
The MCRM Bank would have managed their WAN network properly to stay within the competitive
area. Hence all its branches could workout collectively on their daily business activities as the
network system designed would have assisted MCRM Bank on communication system on solving
problems at both cost and time effectively. As a new and fast growing bank, MCRM bank need
appropriate centralize system network design to support their business in delivering the good service
for its customer.
In setting up the network for the Bank there are a lot of factor to be considered especially for its
reliability, privacy and security.
In considering the hardware and software, we saw it from the both side, MCRM bank network and
the selected technology requirements. After doing some researches for some famous vendors, we
suggesting to uses the Cisco devices. Based on their experience in manufacturing network device, this
vendor can guarantee to provide high quality hardware to be used in MCRM Bank WAN network
Reference
Online source:
Book source:
Michael, P& Robert, B, 2003, Guide to designing and implementing Local and Wide Area
Networks, Second Edition, Course Technology.
WestNet Learning Technology, 1999, Network Design, Singapore, Thomson Learning.
Appendix 1
Terms and Acronyms
Table : Define terms and acronyms are used throughout the documentation
Term Acronyms
ACL Access Control List
Telekom Malaysia Berhad (TM), Malaysia’s leading integrated information and communications
group, offers a comprehensive range of communication services and solutions in broadband, data and
fixed-line. The Group places emphasis on continuing customer service quality enhancements and
innovations.
TM is poised to position Malaysia as a regional Internet hub and digital gateway for South-East Asia.
In line with this, TM would be able to provide WAN for the Bank headquarters and its branches as it
has large network system across Malaysia. (Telekom Malaysia Berhad, 2009)
TM offers the service for line that would be placed for the Bank primary link connection. This will
provide high speed connectivity which ranges in between 512 Kbps to 2 Mbps with annual cost
starting from RM10, 800 annually which would be supportively on establishing WAN between the
Bank headquarters and its branches.
TM Digital Line services support range of application such, high speed transmission, Video images
transmission and conferencing, Private Wide Area Network, voice transmission and high speed
internet access which would adequately establish dedicated WAN as secondary link for the Bank
recovery plan as well as enable internet connection and VoIP. (Telekom Malaysia Berhad, 2009)
Appendix 2
Contribution of each member
Signature