General discussion
-
Topic
-
Cisco “VPN” v. Windows 2000 VPN ?
LockedMy client has two offices, linked over the Internet by a “VPN” implemented on Cisco equipment (Catalyst 2900 routers). I’m not an expert on VPNs, but it seems the setup (configured by a third-party) is very different from my idea of a VPN, and is quite awkward to use and to maintain.
My idea of a VPN for this application is Microsoft’s Windows 2000 router-to-router VPN, which I understand can provide effectively a network layer router connection between two private subnets, allowing more or less any IP traffic to pass freely between them (constrained only by the permissions configured on the hosts). In particular, any IP address on either Intranet subnet, could be accessed from any host on the network, via ordinary network layer communications (e.g. ARP, ICMP, routing protocols, etc). I understand the transport across the Internet would employ encrypted packets, having characteristics (port number, etc) of “VPN traffic” between the two tunnel end-points, and not exhibiting (tothe public Internet) any indication of what they really are.
In contrast, the facility installed using the Cisco equipment, seems to require you to (1) identify the specific hosts on the remote network which will communicate with each othervia the VPN; (2) assign “external” IP addresses to these (using addresses from a publicly-registered IP subnet); and then (3) setup and maintain Network Address Translation to map between the internal host IP addresses, and these external (public) addresses. Adding extra hosts requires skilled maintenance work on the Cisco equipment, to add the new NAT mappings. If you want to use names (rather than IP addresses), you have to provide distinct name resolution services (DNS, WINS, LMHOSTS, or whatever) in each subnet.
If you can shed any light on my confusion, I would be very grateful. My inclination is to replace the present setup with a Windows 2000 VPN?