Offline mode
Download
Report
Transcript Offline mode
Topics
1. Security options and settings
2. Layer 2 vs. Layer 3 connection types
3. Advanced network and routing options
4. Local connections
5. Offline mode
Lock security options –
Admin password
•
The most important one!
•
The admin user can change all the security settings in the Lock, so the
password should be changed from the default
Lock security options –
MAC/IP filter
•
Settings -> Industry settings -> Limit LAN traffic to certain MAC or IP
addresses
•
Allowed targets can be specified either using MAC address or IP address
•
Useful especially in mode A
Lock security options –
“Do not enter” sign
•
Prevents new connections towards the Key from Lock’s LAN and other
connected devices
•
Enabled by default and changeable in Edit Tosibox devices
Lock security options –
Prevent traffic between Sub Locks
•
Used for isolating Sub Lock networks from each other
•
Devices in each Sub Lock network can only access the “main”
Lock’s LAN and the Internet, but not devices behind other Sub
Locks
•
Helps also performance-wise because it reduces the
broadcast traffic that would “leak” between the VPN
connections
Different connection types
•
Layer 2 – bridged, site-to-site
•
Creates a virtual network interface that appears to be residing in the remote network
•
Can be thought of as having a really long ethernet cable to the remote network
•
Each remote user gets its own address from the remote network
•
Works on the data link layer (MAC)
•
Layer 3 – routed, point-to-point
•
Tunnel end points have private addresses
•
Data is routed to the remote network via the remote end of the tunnel
•
Traffic in the remote network appears to be coming from the Lock device – no additional
addresses need to be allocated
•
Works on the network layer (Internet Protocol)
Changing the connection type
•
•
The default connection type is
•
Layer 2 for Key-Lock connections
•
Layer 3 for Key-Central Lock connections and Mobile Clients
The connection type can be changed in Lock’s web UI by clicking Edit
Tosibox devices
Advanced network options –
Routing Key users’ Internet connection through Lock
•
Similar to traditional corporate VPN setups
•
Usually slows down the Internet access a bit
•
Can be useful for providing access to office/corporate network
resources (via WAN) when Lock is deployed in mode B
•
Or forcing all traffic to go through the company’s proxy or
firewall
Advanced network options –
Access to hosts through WAN
•
Used for providing access to only selected devices outside Lock’s WAN
connection. Settings -> Industry settings
•
Other traffic (e.g. Internet) is not routed via the Lock
Advanced network options –
Static routes
•
Low-level configuration interface for more complex and rare cases
•
Needed e.g. if there are multiple routers in the LAN providing access to
different destinations
•
Static routes are pushed also to Key users’ computers - requires Layer 3
connection
•
Configuration at Network -> Static routes
Local connections
•
TOSIBOX Key periodically sends out messages in the local networks
(LANs) to discover Locks or Central Locks
•
When a connection is requested to a Lock/Central Lock located in the
same LAN, a direct connection is made locally, without MatchMaking
service
Offline mode
•
•
It is also possible to disable Internet access in the Lock device so that only local
connections are allowed (so-called Offline mode). The administrator can choose to
block either:
•
All Internet access: both inbound VPN connections and outbound Internet access from
LAN is blocked
•
VPN access from Internet (inbound)
A temporary exception (timer) can be defined for both, e.g. to allow a technician to
get remote access for one hour to perform maintenance work
Offline mode
•
•
It is also possible to disable Internet access in the Lock device so that only local
connections are allowed (so-called Offline mode). The administrator can choose to
block either:
•
All Internet access: both inbound VPN connections and outbound Internet access from
LAN is blocked
•
VPN access from Internet (inbound)
A temporary exception (timer) can be defined for both, e.g. to allow a technician to
get remote access for one hour to perform maintenance work