Got it

Huawei VPN

Created: Apr 2, 2020 14:08:27Latest reply: Apr 2, 2020 14:26:43 517 1 0 0 0
  Rewarded HiCoins: 0 (problem resolved)

Hi, there.

how can we manage to use communication tunnels when we don't want to use social networks? like WhatsApp, skype ... how can Huawei help us with here VPN equipment.

Thanks.

Featured Answers

Dear user,

Using IPSec VPN to Implement Secure Interconnection Between LANs


The headquarters and branches of an enterprise are interconnected in various ways.

Site-to-Site VPN — IPSec

A site-to-site VPN, also called a LAN-to-LAN VPN or a gateway-to-gateway VPN, is used to set up an IPSec tunnel between two gateways, implementing secure access of LANs. Figure 5-22 shows a typical site-to-site IPSec VPN network.

Figure 5-22  Typical site-to-site IPSec VPN network
imgDownload?uuid=01ba4c43c21a46178f6f096

This network requires that two gateways on both ends of the tunnel have fixed IP addresses or fixed domain names, and both parties be able to initiate a connection.

imgDownload?uuid=4f5c6ee06e724619838530a NOTE:

  • Router can serve as both an IPSec gateway and a NAT gateway.

  • When a NAT device exists between two IPSec gateways, Routers support IPSec NAT traversal.

Site-to-Site VPN — L2TP over IPSec

L2TP over IPSec encapsulates packets using L2TP before transmitting them using IPSec. L2TP and IPSec are used together to allow branches to securely access VPNs by dialing the LAC. Branches use L2TP to dial the LAC and obtain private IP addresses on the headquarters network. IPSec is used to ensure communication security during this process.

Figure 5-23 shows a network for the branch to access the headquarters through an L2TP over IPSec tunnel. The outbound interfaces of the LAC (FW_A) and L2TP network server (LNS) (FW_B) have fixed IP addresses. A user in the branch dials FW_A through PPPoE. FW_A then initiates a tunnel setup request to FW_B over the Internet. An L2TP over IPSec is set up between FW_A and FW_B. Then FW_A authenticates the user, and FW_B can also authenticate the user again after the user is successfully authenticated by FW_A. After the user is successfully authenticated by FW_B, FW_B assigns a private IP address to the user.

Figure 5-23  Branch accessing the headquarters through an L2TP over IPSec tunnel
imgDownload?uuid=6e5bc88708964da48efd102

Site-to-Site VPN — GRE over IPSec

Generic Routing Encapsulation (GRE) is a generic tunneling protocol that encapsulates multicast, broadcast, and non-IP packets. GRE, however, provides only simple password authentication but not data encryption, and therefore cannot ensure data transmission security. IPSec provides high data transmission security but cannot encapsulate multicast, broadcast, or non-IP packets. Leveraging advantages of GRE and IPSec, GRE over IPSec encapsulates multicast, broadcast, and non-IP packets into common IP packets. For example, to hold a video conference between a branch and the headquarters, use GRE over IPSec to transmit service traffic on an IPSec VPN.

Figure 5-24 shows a typical GRE over IPSec VPN network.

Figure 5-24  Typical GRE over IPSec VPN network
imgDownload?uuid=721944afc3ef40d3aa87da5

GRE over IPSec supports the transport and tunnel encapsulation modes. Compared to the transport mode, the tunnel mode adds an extra IPSec header, which makes the packet longer and more likely to be fragmented. Therefore, GRE over IPSec in transport mode is recommended.

Site-to-Multisite (Hub-Spoke VPN)

In most cases, the headquarters of an enterprise are connected to multiple branches through IPSec VPN tunnels. Figure 5-25 shows a typical hub-spoke IPSec VPN network.

Figure 5-25  Typical hub-spoke IPSec VPN network
imgDownload?uuid=1b2ec58ca2d74a989f25b10
The headquarters has a fixed public IP address or a fixed domain name. Branches support static or dynamic public IP addresses and private IP addresses. Data traffic is transmitted in the following scenarios:


  • Branches do not need to communicate with each other.

  • Deploy IPSec VPN between the headquarters and branches.

  • Branches need to communicate with each other.

  • If branches access the Internet using dynamic public IP addresses, traditional IPSec VPN will cause branches to fail to directly communicate with each other. Communication data between branches has to be forwarded through the headquarters. This consumes the CPU and memory resources of the hub (FW_C). In addition, the headquarters must encapsulate and decapsulate traffic between branches, causing additional network delay.

  • To resolve this problem, deploy Dynamic Smart VPN (DSVPN) to set up VPN tunnels between branches using dynamic IP addresses. However, multipoint GRE (mGRE) tunnels do not have the encryption function and cannot ensure communication security. To achieve communication security, bind DSVPN with the IPSec security framework, that is, deploy DSVPN over IPSec. For details about DSVPN over IPSec, see DSVPN Protected by IPSec.

View more
  • x
  • convention:

All Answers

Dear user,

Using IPSec VPN to Implement Secure Interconnection Between LANs


The headquarters and branches of an enterprise are interconnected in various ways.

Site-to-Site VPN — IPSec

A site-to-site VPN, also called a LAN-to-LAN VPN or a gateway-to-gateway VPN, is used to set up an IPSec tunnel between two gateways, implementing secure access of LANs. Figure 5-22 shows a typical site-to-site IPSec VPN network.

Figure 5-22  Typical site-to-site IPSec VPN network
imgDownload?uuid=01ba4c43c21a46178f6f096

This network requires that two gateways on both ends of the tunnel have fixed IP addresses or fixed domain names, and both parties be able to initiate a connection.

imgDownload?uuid=4f5c6ee06e724619838530a NOTE:

  • Router can serve as both an IPSec gateway and a NAT gateway.

  • When a NAT device exists between two IPSec gateways, Routers support IPSec NAT traversal.

Site-to-Site VPN — L2TP over IPSec

L2TP over IPSec encapsulates packets using L2TP before transmitting them using IPSec. L2TP and IPSec are used together to allow branches to securely access VPNs by dialing the LAC. Branches use L2TP to dial the LAC and obtain private IP addresses on the headquarters network. IPSec is used to ensure communication security during this process.

Figure 5-23 shows a network for the branch to access the headquarters through an L2TP over IPSec tunnel. The outbound interfaces of the LAC (FW_A) and L2TP network server (LNS) (FW_B) have fixed IP addresses. A user in the branch dials FW_A through PPPoE. FW_A then initiates a tunnel setup request to FW_B over the Internet. An L2TP over IPSec is set up between FW_A and FW_B. Then FW_A authenticates the user, and FW_B can also authenticate the user again after the user is successfully authenticated by FW_A. After the user is successfully authenticated by FW_B, FW_B assigns a private IP address to the user.

Figure 5-23  Branch accessing the headquarters through an L2TP over IPSec tunnel
imgDownload?uuid=6e5bc88708964da48efd102

Site-to-Site VPN — GRE over IPSec

Generic Routing Encapsulation (GRE) is a generic tunneling protocol that encapsulates multicast, broadcast, and non-IP packets. GRE, however, provides only simple password authentication but not data encryption, and therefore cannot ensure data transmission security. IPSec provides high data transmission security but cannot encapsulate multicast, broadcast, or non-IP packets. Leveraging advantages of GRE and IPSec, GRE over IPSec encapsulates multicast, broadcast, and non-IP packets into common IP packets. For example, to hold a video conference between a branch and the headquarters, use GRE over IPSec to transmit service traffic on an IPSec VPN.

Figure 5-24 shows a typical GRE over IPSec VPN network.

Figure 5-24  Typical GRE over IPSec VPN network
imgDownload?uuid=721944afc3ef40d3aa87da5

GRE over IPSec supports the transport and tunnel encapsulation modes. Compared to the transport mode, the tunnel mode adds an extra IPSec header, which makes the packet longer and more likely to be fragmented. Therefore, GRE over IPSec in transport mode is recommended.

Site-to-Multisite (Hub-Spoke VPN)

In most cases, the headquarters of an enterprise are connected to multiple branches through IPSec VPN tunnels. Figure 5-25 shows a typical hub-spoke IPSec VPN network.

Figure 5-25  Typical hub-spoke IPSec VPN network
imgDownload?uuid=1b2ec58ca2d74a989f25b10
The headquarters has a fixed public IP address or a fixed domain name. Branches support static or dynamic public IP addresses and private IP addresses. Data traffic is transmitted in the following scenarios:


  • Branches do not need to communicate with each other.

  • Deploy IPSec VPN between the headquarters and branches.

  • Branches need to communicate with each other.

  • If branches access the Internet using dynamic public IP addresses, traditional IPSec VPN will cause branches to fail to directly communicate with each other. Communication data between branches has to be forwarded through the headquarters. This consumes the CPU and memory resources of the hub (FW_C). In addition, the headquarters must encapsulate and decapsulate traffic between branches, causing additional network delay.

  • To resolve this problem, deploy Dynamic Smart VPN (DSVPN) to set up VPN tunnels between branches using dynamic IP addresses. However, multipoint GRE (mGRE) tunnels do not have the encryption function and cannot ensure communication security. To achieve communication security, bind DSVPN with the IPSec security framework, that is, deploy DSVPN over IPSec. For details about DSVPN over IPSec, see DSVPN Protected by IPSec.

View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.