# Explain WAN Provider Links
PG. 386
## Wide Area Network Technologies and the OSI Model
- Enterprise WAN - used and controlled by a single organization
- WAN physical layer
- media type & interface specifications
- Modulation (out data) and demodulation (in data) -> performed by a modem
- Modulation -> transforming an electromagnetic wave to represent information
- Analog modems -> only supports low bandwidths (up to 56 kbps)
- Digital modems -> performs different type of modulation then analog
- WAN data link layer
- typically use simpler protocols then Ethernet LANs as links are typically point-to point and do not need to by complex
- Serial data protocols
- WAN network layer
- customer and provider site are addressed using IP
- A CE router connects to a PE via the underlying link layer interface
- Provider allocates **public** IPv4/IPv6 address/ranges to the customer
- Customer Edge (CE) router link to Provider Edge (PE) router
## WAN Provider Links
- Establishing a WAN provider link means: terminating the access provider's cabling at some point on prem (demarc) and then attaching modem and routing equipment
- Minimum point of entry (MPOE) AKA Demarcation Point (DEMARC)
- Customer premises equipment (CPE)
- Entrance facilities
## T-Carrier and Leased Link Provider Links
- Time Division Multiplexing (TDM) circuits
- 64 kbps channels
- 24 channels multiplexed as a T1 leased line
- Legacy
- Smart jack / Network Interface Unit (NIU)
- Serial digital signal over 2-pair UTP
- RJ-48C or RJ-48X to connect to the CSU/DSU (WAN CARD)
- Channel Service Unit/Data Service Unit (CSU/DSU)
- DSU digital modem encodes signal from PBX/router
- Encodes the signal from DTE (data terminal equipment)
- CSU performs diagnostics
- Typically implemented as a WAN interface card
- Data link layer
- High-level data link control (HDLC) or Point-to-point Protocol (PPP)
## Digital Subscriber Link Provider Links
- Shares the same physical telephone line but uses higher frequency range
- DSL modem installed as CPE typically as a multifunction *wireless router*
- Rj-11 WAN port connects to the provider's phone jack over a short length ribbon cable
- Supplied as separate appliances or plug-in cards for routers
- Standalone DSL modem is connected to the phone line via an RJ-11 port and to the local network's router
- Filters must be installed on telephone points or at the demarc point to prevent noise from voice calls or the DSL link
- The main drawback of DSL is that as its a copper-wire technology is suffers from attenuation
- DSL modem max range -> 3 miles
- DSL types:
- Symmetrical DSL (SDSL)
- same downlink and uplink bandwidth
- Typically provided as a business package
- Asymmetrical DSL (ADSL)
- consumer version of DSL, provides fast downlink, but a slow uplink
- ISP may impose usage restrictions to limit the amount of data downloaded per month
## Fiber to the Curb
- Fiber to the X (FTTx)
- Fiber optic cabling in the last mile
- To the Home (FTTH), To the premises (FTTP)
- To the Node (FTTN), To the Curb (FTTC)
- Very High Bitrate DSL (VDSL)
- Supports FTTC with VDSL over the last part of link (up to 300m)
- Up to 52 mbps downstream and 6 mbps upstream
- VDSL2 up to 100 mbps over 100m (300ft)
## Cable Provider Links
- Shares the same physical cable as a cable access TV (CATV)
- Coax link to customer premises
- Fiber optic core network
- Cable modem installed as CPE
- Connects to a service provider network using coax F-connector
- Data Over Cable Service Interface Specification (DOCSIS)
- Downlink speeds of up to 38 mbps (NA) or 50 mbs (EU) and uplinks of up to 27 mbs
- DOCSIS version 3 allows use of multiplexed channels to achieve higher bandwidth
## Metro-Optical Provider Links
ETHERNET OVER FIBER
- Carrier Ethernet
- Physical service types
- Service categories
- Passive Optical Network
- Residential/SME fiber to the home (FFTH or premises (FTTP) service
- Speeds of 100 mbps+
- CPE router connects to optical network terminator (ONT) at demarc via fiber optic patch cable
- E-Line -> point-to-point
- E-LAN -> mesh topology (multiple sites)
## Microwave Satellite
- aligned with orbiting satellites
- Geostationary with the equator
- Subject to higher latency
- ISP installs a very small aperture terminal (VSAT) satellite dish at the customer's site
- Connected via coax to a digital video broadcast satellite (DVB-S) modem
- big time issues for anything real-time; such as videoconferencing, VoIP, and multiplayer gaming
# Compare and Contrast Remote Access Methods
## Remote Network Access Authentication and Authorization
- Authenticate and authorize users
- Document service, risks, and countermeasures
- Define policy restrictions
- Users/groups, time of day, privileges, auditing...
- Manage remote devices
## Tunneling and Encapsulation Protocols
- Establish a host on the same logical network over a connection through a different network
- secure tunnel for private communications thru the internet (VPN)
- very efficient in terms of cost
- provides security for transmissions and prevents unauthorized uses from making use of the VPN connection
- point-to-Point Protocol (PPP)
- Encapsulation for higher layer packets at layer 2
- Works over serial point-to-point links
- VPN depends on tunneling protocols. Tunneling is used when the source and destination hosts are on the same logical network but connected via different physical networks
- PPP encapsulation protocol works at layer 2
- encapsulates IP packets for transmission over serial digital lines
- Has no security mechanisms, so it must be used with other protocols to provision a secure tunnel
- Generic Routing Encapsulation (GRE)
- Encapsulates packets at layer 3 (IP protocol #47)
- Supports point-to-point and point-to-multipoint (mGRE)
- Independent of PHY/data link network implementation
•IPSecurity (IPSec) -> typically at layer 3
•Transport Layer Security (TLS) and Datagram TLS (DTLS)
## Client-To-Site VPNs
- Remote access or telecommuter model
- Protocols
- TLS, SSTP, Layer 2 tunneling protocol (L2TP), IPSec
- EAP,RADIUS authentication -> logins to switches and routers also TACACS
- Split tunnel -> the client accesses the Internet directly using its “native” IP configuration and DNS servers.
- Full tunnel -> Internet access is mediated by the corporate network, which will alter the client’s IP address and DNS servers and may use a proxy.
## Remote Host Access and Remote Desktop Gateways
A remote access VPN refers to extending local network access over an intermediate
public network, so that a remote computer is effectively joined to the local network.
Remote access can also refer to remote host access, where a user operates a
computer or configures a network appliance without having to use a local terminal.
This type of remote host access can be implemented within a local network or over
a public network. It can be used for a variety of purposes:
- <u>Remote configuration of network appliances.</u> Most of these appliances are headless (they do not have a video monitor or input devices) and remote connections are the only practical configuration option. This type of connection it typically implemented using Secure Shell (SSH).
- <u>Remote desktop connections either allow an administrator to configure a server
or a user to operate a computer remotely</u>. Where remote desktop protocols provide GUI access, other protocols can be used for terminal-only access.
- <u>Remote desktop gateways allow user access to networked apps</u>. A gateway can also be used to connect a user to a virtual desktop, where a client OS and applications software is provisioned as a virtual appliance. Alternatively, a remote desktop gateway is a means of implementing a clientless VPN.
## Site to Site VPNS
- Cheap to setup
- use existing internet
- operates automatically
- The gateways exchange security information using whichever protocol the VPN is based on
- this establishes a trust relationship between the gateways and sets up a secure connection through which to tunnel data
- Hosts at each site do not need configuring with any information about the VPN
- infrastructure at the site determines whether to deliver traffic locally or sent over the VPN tunnel
## Hub and Spoke VPNs and VPN Headends
- Hub and spoke topology
- VPN headend
- Dynamic Multipoint VPN (DMVPN)
- IPSec for security
- next hop router protocol (NHRP)
- GRE Tunneling
- Headend is used for central office locations, needing to be able to handle lots of data
## Internet Protocol Security
- layer 3 encryption protocol suite
- Authentication Header (AH)
- Provides authentication/integrity only
- ![[Pasted image 20230605094926.png]]
- Encapsulation Security Payload (ESP)
- Confidentiality and authentication/integrity
- ![[Pasted image 20230605094957.png]]
- IPv4 and IPv6 implementations
## IKE and IPSec Modes
- Internet key exchange (IKE)
- Setup Security Associations (SA)
- IPSec modes
- Transport Mode
- IP header is unencrypted, just payload data
- Used for end-to-end communication over the same network
- Tunnel mode
- Encapsulates encrypted packet within new unencrypted header
- used when traffic must pass over and intermediate network (VPN)
## Out-of-band Management Methods
- managed vs unmanage appliances
- Mangement interface
- Console port/CLI
- Aux port dial-up link
- Management port (connect over IP network)
- web interface using HTTP/HTTPS
- Virtual CLI over telnet/ssh
- In-band vs out-of-band management networks
- OOB -> port for management access to physically separate network infrastructure
- In-band -> connecting within the network