Antikor v2 Layer2 Tunnel Backbone

Antikor v2 Layer2 Tunnel Backbone

grid-3-2
Layer 2 Communications over the WAN
Layer 2 Communications over the WAN
The AntiKor L2 Tunnel solution creates a closed network through Layer 2 secure bridging over IP between remote networks. Internetwork exchanges are encrypted. A network operates as if it is connected to the same switch as another network. In other words, broadcast domains of both networks are converged so that all computers on two networks can communicate with each other via their virtual IPs without routing.
Adding VLAN Tagging
Adding VLAN Tagging
It is expected that whole traffic would be carried without a tag in the case no VLAN is created at remote sites of your enterprise. Nevertheless, it may be necessary to seperate such traffic from VLAN1 at the central site. The AntiKor L2 Tunnel provides insulation between networks by adding a VLAN tag to the desired connections. Those packages would be added to your network at the centre as a tagged trunk.
Homogeneous Security
Homogeneous Security
Having separate Firewalls for each site may create management challenges for enterprises with multiple sites. In addition, security vulnerabilities may occur due to user errors while configuring all security policies one by one. Only one central Firewall would be sufficient if a tunnelling solution is used and all policies implemented in the central Firewall would apply to all sites.
Operation Independent From Different Connection Types
Operation Independent From Different Connection Types
L2 Tunnel can be reliably implemented in the event the enterprise has different types of Internet connection for each site, such as FrameRelay, ATM, Metroethernet, xDSL, 3G.
Multiple VLAN Transfer in the WAN
Multiple VLAN Transfer in the WAN
The communications infrastructure in our country does not allow a multiple VLAN transfer between ends and the centre with direct tags over the WAN. The IEEE 802.1QinQ protocol cannot be operated over the WAN due to incapability of MTU. The AntiKor L2 Tunnel works independent form the service provider and can transfer VLAN tags between the nodes.
Central Management
Central Management
All external lines from remote sites are combined into one device. Management is facilitated with a single Firewall an done Logging solution at the centre. There would be no need for a Firewall and Logging solution at the nodes as all nodes are directly connected to the centre. All users are subject to central Firewall rules. It enables that all MAC addresses are sent to the centre to maintain IP distribution logs required to be maintained pursuant to legal requirements even if no DHCP is assigned. It also enables MAC-IP matching check.
Low Cost
Low Cost
Thanks to its central cyber security management architecture, a central Firewall whould be sufficient for VLAN management and centralized logging by using Antikor L2 Tunnel since there will be no need for a WAN license for the enterprise automations or to obtain license for every site licensing costs would be reduced.
User Friendly Easy Interface
User Friendly Easy Interface
Using the Tunneling is very easy with HTML5 and Bootstrap responsive interface. A modern, clean, easy-to-use, intelligible and user-friendly interface design makes management of the AntiKor L2 Tunnel easy.