3Com 3C8S5907 User Guide - Page 69

Example 1

Page 69 highlights

69 Example 1 In Figure 18, the ISP is configured to create a tunnel from the ISP's access server to the central site. This method can also be used for a remote office if you do not want to configure tunneling on the bridge/router at the remote office. Figure 18 ISP to Central Site Tunnel Access ISP server PPTP or L2TP tunnel Central site Remote workstation Total Control hub Authentication server Firewall or CSU/DSU (optional) PathBuilder switch Authentication server The connection process typically follows this order: s The remote user (the client) dials the ISP. s The ISP assigns an IP address to the remote user client. s The ISP checks its authentication server for the user, and creates a PPTP (or L2TP) tunnel to the central site based on authentication data. s The central site checks its authentication server to verify that this user can access the network and forwards the data. No special configuration is required on the remote user computer except the configuration required to dial into the ISP's access server. At the central site, follow these steps: 1 Configure the L2Tunnel Service (see the Configuring L2Tunnel Connections chapter in Using Enterprise OS Software) to enable the PathBuilder switch as a tunnel terminator. 2 Configure the firewall device (if present), or the PathBuilder switch, to allow tunnel traffic through (see the Building Internet Firewalls chapter in Using Enterprise OS Software).

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190

69
Example 1
In Figure 18, the ISP is configured to create a tunnel from the ISP’s access
server to the central site.
This method can also be used for a remote office if you do not want to
configure tunneling on the bridge/router at the remote office.
Figure 18
ISP to Central Site Tunnel
The connection process typically follows this order:
The remote user (the client) dials the ISP.
The ISP assigns an IP address to the remote user client.
The ISP checks its authentication server for the user, and creates a
PPTP (or L2TP) tunnel to the central site based on authentication data.
The central site checks its authentication server to verify that this user
can access the network and forwards the data.
No special configuration is required on the remote user computer except
the configuration required to dial into the ISP’s access server.
At the central site, follow these steps:
1
Configure the L2Tunnel Service (see the Configuring L2Tunnel
Connections chapter in
Using Enterprise OS Software
) to enable the
PathBuilder switch as a tunnel terminator.
2
Configure the firewall device (if present), or the PathBuilder switch, to
allow tunnel traffic through (see the Building Internet Firewalls chapter in
Using Enterprise OS Software
).
Remote
workstation
Central site
PPTP or L2TP tunnel
Firewall
or CSU/DSU
(optional)
ISP
Authentication
server
Authentication
server
Access
server
PathBuilder
switch
Total Control hub