Laserfiche WebLink
Appendix A -Additional VPN Information <br />Point -to -Point Tunneling Protocol (PPTP) is a network protocol that enables the secure transfer of data <br />from a remote client to a private enterprise server, creating a virtual private network (VPN) by using <br />TCP/IP -based data networks. PPTP supports multiple network protocols (IP, IPX, and NetBEUI) and can <br />be used for virtual private networking over public and private networks. You can use PPTP to provide <br />secure, on -demand, virtual networks by using dial -up lines, local area networks (LANs), wide area <br />networks (WANs), or the Intemet and other public, TCP/IP -based networks. <br />IPSec - short for IP Security, a set of protocols developed to support secure exchange of packets at the IP <br />layer. IPsec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the <br />data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode <br />encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each <br />packet. <br />For IPsec to work, the sending and receiving devices must share a public key. This is accomplished <br />through a protocol known as Intemet Security Association and Key Management Protocol/Oakley <br />(ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using <br />digital certificates. <br />IMPORTANT NOTES: <br />It is recommended that the PPTP server have 2 network adapters: one connected to the VisiCAD network <br />and one connected to the Internet router. <br />For security reasons, all users with dial -in permission should have a password assigned and change it on <br />regular basis. Please do not use blank passwords. If possible, rename the Administrator account. <br />FIREWALL <br />It is highly recommended that customers install a firewall to protect the VPN server and the VisiCAD <br />network from intrusion. <br />To allow PPTP VPN traffic through a firewall, the following ports must be opened: <br />➢ Inbound and outbound TCP port # 1723 (PPTP) <br />➢ Inbound and outbound IP port # 47 (Generic Routing Encapsulation) <br />To allow Cisco IPSec VPN traffic through a firewall, the following ports must be opened: <br />➢ Inbound and outbound UDP # 10,000 <br />➢ Inbound and outbound UDP # 4,500 <br />➢ Inbound and outbound UDP # 500 <br />Site Preparation and Support Connectivity Guide, V3.1 dated 8.12.2005 Page 13 of 13 <br />TnTech Software Systems - Confidential & Proprietary <br />