Billion Electric Company 30 user manual Virtual Private Networking

Models: 30

1 209
Download 209 pages 59.73 Kb
Page 29
Image 29
In the example above, the client is making a DNS request. The request is sent to the DNS server of BiGuard 30 through WAN2 (1). WAN2 will route this request to the embedded DNS server of BiGuard 30 (2). BiGuard 30 will analyze the bandwidth of both WAN1 and WAN2 and decide which WAN IP to reply to the request (3). After the decision is made, BiGuard 30 will route the DNS reply to the user through WAN2 (4). The user will receive the DNS reply with the IP address of WAN1 (5). The browser will initiate an HTTP request to the WAN1 IP address (6). The HTTP request will be send to BiGuard 30’s URL Host Map (7). The Host Map will then redirect the HTTP request to the HTTP server (8). The HTTP server will reply (9). The URL Host Map will route the packet through WAN1 to the user (10). Finally, the client will receive an HTTP reply packet (11).

11 HTTP Reply

5 DNS Reply

1 DNS Request

6HTTP Request

WAN 1

10Manual backgroundManual background 7

URL Host Map

9 8

2

DNS Server

3

Bandwidth Monitor

WAN 2

4

HTTP Server

In the example above, the client is making a DNS request. The request is sent to the DNS server of BiGuard 30 through WAN2 (1). WAN2 will route this request to the embedded DNS server of BiGuard 30 (2). BiGuard 30 will analyze the bandwidth of both WAN1 and WAN2 and decide which WAN IP to reply to the request (3). After the decision is made, BiGuard 30 will route the DNS reply to the user through WAN2 (4). The user will receive the DNS reply with the IP address of WAN1 (5). The browser will initiate an HTTP request to the WAN1 IP address (6). The HTTP request will be send to BiGuard 30’s URL Host Map (7). The Host Map will then redirect the HTTP request to the HTTP server (8). The HTTP server will reply (9). The URL Host Map will route the packet through WAN1 to the user (10). Finally, the client will receive an HTTP reply packet (11).

2.6Virtual Private Networking

A Virtual Private Network (VPN) enables you to send data between two computers across a shared or public network in a manner that emulates the properties of a point-to-point private link. As such, it is perfect for connecting branch offices to headquarters across the Internet in a secure fashion.

29

Page 29
Image 29
Billion Electric Company 30 user manual Virtual Private Networking