SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Fig.1
                                               NIB – II
                           Srinagar          TOPOLOGY

                                                          Shimla
                          Chandigarh

                                                                   IGW
                                                      Delhi


                                             Noida                   Noida



                              Jaipur
                                                                                                           Guwahati
                                                                   Lucknow

                                                                                              Patna
Gandhinagar / Ahmedabad
                                         Bhopal


             Mumbai                                                                                       Kolkata
              BRAS
                                          Chattisgarh                                                      IGW
  IGW
                                                                                                      Kolkata

  Mumbai



                                                          H-bad
     IGW          Pune                                    BRAS
                                                                                           Bhubaneshwar
                                                                      IGW


            Goa



                              Bangalore
                                                                         Chennai
                                                     Bangalore
                                                                          IGW
                                                                     Chennai
                                              IGW

                                                                             Pondicherry
                                                                      Back Office facilities – Web hosting,
                                                                      Customer servers, Messaging, Caching,
                             Ernakulam                                Billing, etc.
           IGW                                                        CORE Router
                                                                         EDGE Router
                                                                         BRAS

                                                                           STM16
                          Thiruvanthapuram
                                                                           STM1
Fig. 2
                                                     NIB – II
                                                  ARCHITECTURE
             DIAL – UP
           CONNECTIONS                     TO OTHER CORE ROUTERS




                                                                                             NATIONAL INTERNET
                                                                                                  EXCHANGE
                                                                                                 TO CONNECT
           PSTN NETWORK                                                                     ALL ISPs AND PROVIDE
                                                                                                   COMMON
                                                                                               INTERNATIONAL
                                                                                                   GATEWAY
                                                       CORE ROUTER
           RAS

DIAL – UP                                                                                         EDGE ROUTERS          NIEX
SERVICE EDGE ROUTERS                                                                                                EDGE ROUTER
  EDGE
ROUTER                                                       TIER I


                 BRAS                      BRAS                       BRAS                                     BRAS



                 EDGE ROUTERS              EDGE ROUTERS                    EDGE ROUTERS              EDGE ROUTERS




                                                                                                                        MPLS VPN
                                                                                                     EDGE ROUTERS
 TIER II        TIER II       TIER II   TIER II        TIER II         TIER II                                        EDGE ROUTER



      TIER II           TIER II              TIER II             TIER II

                                                                                       DSLAMs




                                        DSLAMs

                                                                                  Leased Lines from VPN Subscriber Premises
Explanatory Motes on VPN Vulnerability

Slide 1 shows the topology of a typical ISP’s IP network over which
    both Internet and VPN services are laid out. This is the topology of
    BSNL’s NIB – ii. Five cities are connected in a full mesh
    connectivity to form the core IP back-bone across India. Other
    cities are connected through tri-node rings from the nodes of the
    core network through the Tier-1 switch at these nodes.

Slide 2 shows the architecture of each of these nodes. The core router
    at the node sits on the Tier 1 switch. From these switches are
    taken the router connections for all the services – VPN, Internet
    through Broadband and PSTN. Thus you will note that there is
    continuous physical connectivity between all the routers in this IP
    network through the Tier 1 switch at each IP Node (POP). Thus
    there is continuous public domain access to the VPN routers.

1.   In any IP network, public or private, the WAN ports of all routers in
     the network have continuous physical access to each other. Thus
     while a router port is engaged in communication with another in the
     network, a third port can have simultaneous communications with
     it. If the IP network is in the public domain (Internet) or has access
     from the public domain (VPN), this third port could be that of a
     hacker.
2.   Thus while the various security protocols like IP Sec, etc., can
     transport the data from one computer to another securely, the LAN
     and the data bases residing on it are exposed to public domain
     through a VPN which has public domain access for reasons
     explained in 1 above.
3.   For WAN computing it is necessary to have a real private network
     (at least for data communications). Once this is there then inter-
     locational voice / fax can be run over this network at marginal
     increase in the operating cost, using the patented PVDTN
     system.
4.   You should not expose your company data bases to the public
     domain through Internet, ISDN back-up, or VPN (which has public
     domain access) for reasons explained earlier in 1 above.
5.   The MPLS networks currently in vogue are another form of VPN
     network and are subject to the comments in 1 to 4 above.

We do hope the above notes will explain the security vulnerability of
     your data bases when these are on LANs connected to VPN
     (MPLS or other wise) of any service provider.
If you wish to secure your data bases 100% then use point-to-
     point leased lines for inter-locational computer connectivity.

Contenu connexe

Plus de MIDAS Automation & Telecommunications Pvt. Ltd. (MIDAUTEL)

Plus de MIDAS Automation & Telecommunications Pvt. Ltd. (MIDAUTEL) (11)

Pvdtn
PvdtnPvdtn
Pvdtn
 
Smsdg layout & functioning
Smsdg layout & functioningSmsdg layout & functioning
Smsdg layout & functioning
 
Nwan
NwanNwan
Nwan
 
Llbu
LlbuLlbu
Llbu
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Vo p pstn
Vo p   pstnVo p   pstn
Vo p pstn
 
Mobile
MobileMobile
Mobile
 
Telephony
TelephonyTelephony
Telephony
 
Mpls p2 p
Mpls   p2 pMpls   p2 p
Mpls p2 p
 
Pvdtn fa qs
Pvdtn fa qsPvdtn fa qs
Pvdtn fa qs
 
Pvdtn presentation
Pvdtn presentationPvdtn presentation
Pvdtn presentation
 

Dernier

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Dernier (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

Vpn1

  • 1. Fig.1 NIB – II Srinagar TOPOLOGY Shimla Chandigarh IGW Delhi Noida Noida Jaipur Guwahati Lucknow Patna Gandhinagar / Ahmedabad Bhopal Mumbai Kolkata BRAS Chattisgarh IGW IGW Kolkata Mumbai H-bad IGW Pune BRAS Bhubaneshwar IGW Goa Bangalore Chennai Bangalore IGW Chennai IGW Pondicherry Back Office facilities – Web hosting, Customer servers, Messaging, Caching, Ernakulam Billing, etc. IGW CORE Router EDGE Router BRAS STM16 Thiruvanthapuram STM1
  • 2. Fig. 2 NIB – II ARCHITECTURE DIAL – UP CONNECTIONS TO OTHER CORE ROUTERS NATIONAL INTERNET EXCHANGE TO CONNECT PSTN NETWORK ALL ISPs AND PROVIDE COMMON INTERNATIONAL GATEWAY CORE ROUTER RAS DIAL – UP EDGE ROUTERS NIEX SERVICE EDGE ROUTERS EDGE ROUTER EDGE ROUTER TIER I BRAS BRAS BRAS BRAS EDGE ROUTERS EDGE ROUTERS EDGE ROUTERS EDGE ROUTERS MPLS VPN EDGE ROUTERS TIER II TIER II TIER II TIER II TIER II TIER II EDGE ROUTER TIER II TIER II TIER II TIER II DSLAMs DSLAMs Leased Lines from VPN Subscriber Premises
  • 3. Explanatory Motes on VPN Vulnerability Slide 1 shows the topology of a typical ISP’s IP network over which both Internet and VPN services are laid out. This is the topology of BSNL’s NIB – ii. Five cities are connected in a full mesh connectivity to form the core IP back-bone across India. Other cities are connected through tri-node rings from the nodes of the core network through the Tier-1 switch at these nodes. Slide 2 shows the architecture of each of these nodes. The core router at the node sits on the Tier 1 switch. From these switches are taken the router connections for all the services – VPN, Internet through Broadband and PSTN. Thus you will note that there is continuous physical connectivity between all the routers in this IP network through the Tier 1 switch at each IP Node (POP). Thus there is continuous public domain access to the VPN routers. 1. In any IP network, public or private, the WAN ports of all routers in the network have continuous physical access to each other. Thus while a router port is engaged in communication with another in the network, a third port can have simultaneous communications with it. If the IP network is in the public domain (Internet) or has access from the public domain (VPN), this third port could be that of a hacker. 2. Thus while the various security protocols like IP Sec, etc., can transport the data from one computer to another securely, the LAN and the data bases residing on it are exposed to public domain through a VPN which has public domain access for reasons explained in 1 above. 3. For WAN computing it is necessary to have a real private network (at least for data communications). Once this is there then inter- locational voice / fax can be run over this network at marginal increase in the operating cost, using the patented PVDTN system. 4. You should not expose your company data bases to the public domain through Internet, ISDN back-up, or VPN (which has public domain access) for reasons explained earlier in 1 above. 5. The MPLS networks currently in vogue are another form of VPN network and are subject to the comments in 1 to 4 above. We do hope the above notes will explain the security vulnerability of your data bases when these are on LANs connected to VPN (MPLS or other wise) of any service provider. If you wish to secure your data bases 100% then use point-to- point leased lines for inter-locational computer connectivity.