753
Programming Operations Guide
Chapter 39
Virtual Private Networks (VPN)
Business Communications Manager uses the Internet and tunneling protocols to create secure
extranets. These secure extranets require a protocol for safe transport from the Business
Communications Manager to another device through the Public Data Network (PDN). Business
Communications Manager uses the PPTP (
“PPTP” on page 754
) and IPSec (
“IPSec” on page 765
)
tunneling protocols. Both of these protocols have encryption, but IPSec has a slightly more secure
hashing algorithm for negotiating keys.
Extranets can connect:
•
mobile users to a fixed private network at their office over the PDN
•
private networks in the two branch offices of the same corporation over PDN
•
two divisions of the same corporation over the corporate intranet
When connecting two branch offices, the use of a VPN over the public data network is very
efficient if the connection is required only intermittently or a dedicated point-to-point link is
considered too expensive. Also, with the advent of business-to-business solutions, VPNs can be
deployed to provide secure connections between corporations.
PPTP tunnel notes
PPTP tunnels are used when a mobile user wishes to connect securely to a Business
Communications Manager. PPTP client software is required to use a PPTP tunnel. This client
software is available for all personal computer operating systems from Microsoft. This client is
included in Windows 98.
PPTP tunnels are created from a client to a server or from a server to a server. To form an extranet
using PPTP, a mobile, remote user does the following:
•
Establishes a connection with the public data network’s point-of-presence (POP), typically
through an Internet service provider (ISP) using dial up links.
•
After the Internet connection is up, the remote user launches a second connection which is a
VPN tunnel to Business Communications Manager. The Business Communications Manager
public IP address is used to establish the tunnel.
•
On the Business Communications Manager, the user id of the incoming user is enabled for
dial-in access.
Summary of Contents for BCM 3.7
Page 4: ...4 Software licensing N0008589 3 3...
Page 32: ...32 Contents N0008589 3 3 W 937 Index 939...
Page 46: ...46 Tables N0008589 3 3...
Page 64: ...64 How to get help N0008589 3 3...
Page 90: ...90 Manually activating Telnet N0008589 3 3...
Page 116: ...116 Delayed system restart N0008589 3 3...
Page 194: ...194 Configuring a data module N0008589 3 3...
Page 276: ...276 Setting line telco features N0008589 3 3...
Page 310: ...310 Using COS passwords N0008589 3 3...
Page 364: ...364 Enhanced 911 E911 configuration N0008589 3 3...
Page 380: ...380 Renumbering DNs N0008589 3 3...
Page 398: ...398 Saving wizard pages on your computer N0008589 3 3...
Page 458: ...458 Voice Mail settings N0008589 3 3...
Page 488: ...488 Setting system telco features N0008589 3 3...
Page 508: ...508 Other programming that affects public networking N0008589 3 3...
Page 522: ...522 PRI networking using Call by Call services N0008589 3 3...
Page 592: ...592 Monitoring Hunt groups N0008589 3 3...
Page 636: ...636 Configuring Double Density N0008589 3 3...
Page 640: ...640 Using the Network Update Wizard N0008589 3 3...
Page 666: ...666 Importing and Exporting DHCP data N0008589 3 3...
Page 722: ...722 Restarting the router N0008589 3 3...
Page 726: ...726 Important Web Cache considerations N0008589 3 3...
Page 748: ...748 Configuring an Interface with NAT N0008589 3 3...
Page 794: ...794 IPSec N0008589 3 3...
Page 818: ...818 Configuring the Policy Agent characteristics N0008589 3 3...
Page 832: ...832 Firewall rules for Business Communications Manager with Dialup interfaces N0008589 3 3...
Page 876: ...876 ISDN Programming N0008589 3 3...
Page 1004: ...1004 Index N0008589 3 3...