Compare cert salaries and plan your next career move
DerekAustin26 wrote: » In Tulsa, OK we had Class C IP's.. Which interested me because for a huuge enterprise like EDS (now HP) that would only allow 255 IP's for our local site.
DerekAustin26 wrote: » I damn well know for sure that company had way more than 255 users. So maybe we had multiple networks at the same site, and even the whole world.
DerekAustin26 wrote: » So this brings up a few questions? When we RDP into a client's website who works for the same company who lives on the other side of the world, how is this RDP getting through if it's a seperate network? Port Forwarding?
DerekAustin26 wrote: » Since EDS(HP) has lans all over the world, are each of these sites just setup as "Trusts" so that way they allow RDP's from remote "trusted sites" into each other's networks?
DerekAustin26 wrote: » Now if the entire company took out NAT (which explains the whole RDP question & port forwarding confusion), then how would they hide their private IP's so that their not exposed to the internet?
DerekAustin26 wrote: » (Granted, you dont need NAT for protection, but it saves money, who wants to pay for a chunk of Public IP's , especially for a company with that many employees when they can simply use NAT?
DerekAustin26 wrote: » Well every site would have a Core Router, which would be the Border Routers.. Hence the name "backbone" and each Core Router would interface with the Intranet WAN/Internet.
DerekAustin26 wrote: » The Cores are the culprit between Internet or WAN/ LAN - So since each site has one, there would have to be NAT so they wouldnt be wasting IP's, and wasting money on public IP's and exposing their internal IP's to the internet
DerekAustin26 wrote: » Well every site would have a Core Router, which would be the Border Routers.. Hence the name "backbone" and each Core Router would interface with the Intranet WAN/Internet. The Cores are the culprit between Internet or WAN/ LAN - So since each site has one, there would have to be NAT so they wouldnt be wasting IP's, and wasting money on public IP's and exposing their internal IP's to the internet (Granted, you dont need NAT for protection, but it saves money, who wants to pay for a chunk of Public IP's , especially for a company with that many employees when they can simply use NAT?
tiersten wrote: Each machine doesn't need to have a public IP. It may be on a non routable network but they can avoid using NAT by using proxies on servers which do have a public IP. I'd be surprised if there was any large organisation that gave you internet access that didn't go through some sort of proxy.
DerekAustin26 wrote: » Proxy yes! EDS did use Proxy, but our IP's were private which can only mean one thing. We had to of been using NAT. So can you send me a diagram of where the "Border Routers" come into play? What that looks like? I dont see how WANS can have access to each other and the internet at the same time, use Private IP's and not use NAT. Even if they dont use NAT, what I dont understand is how do WANS know they are apart of the same Network if they are on Seperate Networks? Example. Las Angeles Network is 192.168.0.1 while New York's Network is 146.146.10.1 & Chicago's is 172.10.0.1 though they are all on the same Company Wide WAN. I dont understand that.
DerekAustin26 wrote: » So can you send me a diagram of where the "Border Routers" come into play? What that looks like?
mikem2te wrote: » I can do a quick diagram of the last network I worked with tomorrow if you're still confused.
DerekAustin26 wrote: » I understand what a WAN is. I just dont understand how 2 geographically different located LANS know they are on the same WAN if they have different NETWORK ID's. How ?
DerekAustin26 wrote: » I'd appreciate that! Can you be sure to point out the Border Routers?
mikem2te wrote: » I have done a quick picture in Visio of the topology I last worked with. It’s is simplified a fair bit, I’ve not bothered with the DMZs, voice links, SMTP servers, WEB servers and a couple of other bits and pieces. There are about 125 sites, site A is the central site, site B is the major distribution site, sites C and D are regional distribution centres (small) and Sites 1 to 120 are small but identical remote sites. All sites can talk to each other using various methods. Sites A and B not to far apart so they have two redundant private links to each other, a microwave wireless link and a Leased Ethernet Service / LAN Extension Service. The circuit providers installed RJ45 sockets in each site and we just plugged that into the core switch. Basically the two sites are a part of the same LAN, we don’t actually know how the packets get from site A to site B, all we know is the circuit providers provide a virtual private link somehow through their infrastructure. Site A also has two links to the internet via two different ISPs, the ISPs installed their own hardware in our comms rooms to which we connected firewall routers and a proxy server. I have coloured the links with public internet IP address RED while the private LAN links are BLACK. So as you can see the routers and proxy server both have an internet and a LAN connection. Sites C, D and Sites 1 to 120 have similar topology to each other, although with various routers and connection methods to the internet. To connect C, D and Sites 1 to 120 back to the head office Site A we created virtual private networks (IPSec), this in effect joins all the sites together into one big network. So Sites C and D have a virtual private network back to Border Router 1 in the head office while Sites 1 to 120 have a virtual private network back to Border Router 2. So how does the traffic move around the network? A previous post on this thread mentioned ROUTING TABLES. If a host in head office needs to send a packet to a host in Site C it gets it’s IP Address then looks at its routing table to discover where to send it (Border Router 1), Border Router 1 then sends the packet to the Border Router in Site C. Job done. Although the packet does get sent over the internet, it never leaves the protection of the VPN link created between those two sites, as far as the two hosts are concerned the two sites are connected together in one large private network. So for internet access, all the hosts in the network were configured to send any internet requests to the Proxy server, this would then in turn send the request out to the internet on the hosts behalf. When the web page comes back in from the internet the proxy server would relay the page back to the original host. This may not have been the most efficient way for internet access as all sites would connect via head office – accountants are the enemy of IT!!! There is no NAT going on anywhere in the network. The only link between the companies network and the internet was via the proxy server.
DerekAustin26 wrote: » First question I have is... Why dont all the sites have Border Gateways? Why is it just Site A & C ?
DerekAustin26 wrote: » 2nd - Howcome Site A's Proxy Server doesnt have a Border Gateway Router in front of it.. It's directly connected to the ISP's Router as if it's a Router... I never knew a Server could interface with an ISP Router? I always thought Routers talk to only Routers.. (other than their local nodes attached to it) But there, the Proxy Server is using the ISP router like it's a Local Router..??
DerekAustin26 wrote: » 3rd. What is a Microwave Cloud?
DerekAustin26 wrote: » 4th. What is an NTL Cloud?
DerekAustin26 wrote: » 5th - Do Sites 1 - 120 have to manually VPN into Site A as if they are "Remote home users"? Or is this something configured that happens automatically?
DerekAustin26 wrote: » 6th - What is the "LES" Link at the bottom? And is this a private WAN Link?
mikem2te wrote: » NTL is a service provider in the UK.
DerekAustin26 wrote: » First off, i wanna say thanks for helping! Now howcome Sites 1-120 and Site D dont go through their Provider? Or should I assume the "internet Cloud" is including an ISP?
mikem2te wrote: » NTL is an ISP like any other, It's in the diagram because the link between the HO and site C are both connected to the same ISP so hopefully the traffic remains inside the NTL network rather than breaking out and traversing the internet at large. The other sites are connected to various ISPs using cheap as chips broadband.
DerekAustin26 wrote: » Well howcome you cannot access the internet through the NTL Cloud? It's an ISP like any other? Thats a big misunderstanding im having..
mikem2te wrote: » Yes it's an ISP like any other and we could have used it for web access but we decided to use it only for remote site links. We did not want web traffic to affect the remote sites.
DerekAustin26 wrote: » Okay it sounds like what saying is that you have to have at least 2 ISP's to seperate your "Intranet" & your "internet" links? Otherwise, why not just take out the NTL Cloud and use the "internet Cloud" for both.
DerekAustin26 wrote: » So if a PC on Site A wants to access Site C, whats stopping it from traversing the Internet first?
Compare salaries for top cybersecurity certifications. Free download for TechExams community.