Sunteți pe pagina 1din 6

Protocol

Description of Cisco RV110W Firewall Router Protocol


The Cisco RV110W Wireless-N VPN Firewall has protocols that enable VPN access
for remote employees of the business. Such protocols of PPTP, HTTPS and RIP-2 use
TCP/IP internet protocol suite. This implements IPv4.
Composed Protocols of VPN Firewall Protocol
a) Point to Point Tunnelling Protocol (PPTP)
The first Protocol which is Point to Point Tunnelling Protocol (PPTP) is a network
protocol that allows the protected transmission of data from a distant client to a business
network.
PPTP supports Virtual Private Networks (VPNs) with multiple protocols. This
grants remote users an access to networks owned by corporate with high security integrated into
the operating system in use, such as Microsoft OS or Mac.
PPTP uses an extended form of GRE (Generic Routing Encapsulation) in order to transport
the user Point-to-Point-Protocol packets. This provides the PAC (PPT Access Concentrator)
and the PNS (PPT Network Server).
ii. Core Components of PPTP
The PPTP components for this type of firewall router is as follows:
Protocol Structure:
Length Is the sum of length in octets of the above PPTP message inclusive of the PPTP
header.
PPTP message type Is the type of message with probable values of 1 and 2 for
Message Control and Message Management respectively.
Magic Cookie which makes proper synchronization and appropriate data stream of the
TCP of the receiver.
Control Message Type
Call Management
Reserved 0 & 1 - These should be to value of 0.
Protocol version This is the PPTP version number
Framing Capabilities This is an indicator for the kind of frame that the sender of a
particular message could provide.
Bearer Capabilities This is an indicator for senders capability to send a message by
providing 1 or 2 which are Analogue and Digital respectively.
Maximum Channels This is the added number of all PPP sessions that can be
supported by the PPT Access Concentrator (PAC).
Firmware Revision This comprises the revision number of the firmware which is
issued by the PAC.
Host Name This contains the name of the DNS which is issued by the PAC or the PNS.
Vendor Name This comprises the name description for the PAC in use or the PNS
type of software.

iii. Strengths of PPTP Protocol
Compatibility with Windows OS
The first major advantage of using PPTP is the fact that if you use a computer that
operates using Microsofts Windows, it supports PPTP by default.
User Friendliness
Which means, setting up the PPTP protocol is so straight forward since the data has not
been encrypted with the usage of IPsec.
Cost-Effectiveness
This is very cheap and has easy installation process which can be done without even prior
basic knowledge of networking.
iv. Weakness of PPTP protocol
PPTP has some limitations and here are some of the most common drawbacks:
Low Security Standards
Since it does not verify the origin of data while it does not also provide integrity to the
data itself.
Poor Performance on Unstable Connections
The other eminent drawback of this type of protocol is its poor performance whenever it
is used on a network that is known to be unstable.
b) Secure- HTTPS
i. Protocol Description
Secure HTTP (S-HTTP) is a secure message-oriented communications protocol
designed for use in conjunction with HTTP. In addition to this, Secure-HTTP does not need
to have public keys for the side of the client. This is mainly because, it supports transactions
that are secure and end-to-end.
ii. Core Components of the HTTP Protocol
As illustrated on the diagram, the main components of the HTTP is as follows:
The request message has the following format:

Table 1: Core Components of the HTTP Protocol
The Secure-HTTP (HTTPS) allows specific processing which clearly distinguishes its
messages from those of the HTTP.

The response message has the following format:

Precisely, the Status Line of the Secure-HTTP does not indicate anything as to whether
the requested unwrapped HTTP becomes successful or failed.
iii. Strengths of HTTPS
1. Ease of use
One biggest advantages offered by Secure-HTTPS is the ease of use: It makes easier to
distinguish between pictures and audio files that are stored on the web.
2. Connectionless
In addition to that, this protocol does not need connection. This offers users to browse at
a very high speed.
3. More Secure
HTTPS, which is a more secure protocol as compared to the previous HTTP. It provides
data encryption in order to maintain full security for the respective users.
iv. Weakness of HTTPS protocol
On the other hand, HTTPS but it has shortcomings that must be considered.
All web pages that are accessed by Secure-HTTP cannot be cached in a single cache
that could be shared. Such inability of caching by the browser can lead to users no able
to save their files on to storage devices or to have them opened through external web
applications.
Numerous overhead computations are needed in order for the data
encryption/decryption to be successful..
Access to HTTPS websites may not be granted by some proxy and firewall system.
Usage of HTTPS is quite expensive due to its annual charges of issuing certificates.
c) Routing Protocol (RIP-2)
i. Protocol Description
It is an extension of RIP which is meant for the expansion of the quantity of information
to be transmitted in the RIP-2 messages. RIP-2 also offers additional security measures. RIP2
is based on User Datagram Protocol (UDP) whereby every host with RIP2 usage has a
process of routing for sending and receiving datagrams on a UDP with a port number.
ii. Core Components of the RIP-2 Protocol
The components of a routing protocol are as follows as clearly depicted in picture.
RIP-2 Protocol Structure:
Command This is used to specifically state the datagram purpose.
Version This indicates the current version number of the RIP version number.
Address family identifier This shows the type of the specified for the entry.
Route tag -- This is an attribute label given to every route in the network.
IP address This is the IP address of the destination address.
Subnet mask This is the value given to the IP address to generate the non-host part of the
address.
Next hop This is the IP address of the next hop to which packets to the specified
destination by this entry route must be channelled.
Metric which signifies the added cost of obtaining a datagram from the host to the
required endpoint or destination.
iii. Strengths of RIP-2 Protocol
This is known to being a very a standardized protocol.
This protocol is compliant to Variable-Length Subnet Mask (VLSM).
It reflects network changes with quick convergence while sending all the necessary
notifications.
It makes snapshot routing an ideal one for dial networks since it supports and easily
works with snapshot routing.
iv. Weakness of RIP-2 protocol
Due to RIP-2s vulnerability on count-to- infinity, the Max hop count is 15.
RIP-2 does not have the concept of neighbours.
With the exception of triggered update, RIP-2 exchanges the complete table with all
neighbours for every 30 seconds.

S-ar putea să vă placă și