
© Infrant Technologies
15
In this topology, note the following:
9 Each ReadyNAS device (an Rsync client and an Rsync server) resides on its own private
network.
9 Each private network is connected to an untrusted network (192.168.100.0/24) via a VPN
router. Typically, the untrusted network is the Internet, but it can also be parent LAN
segment as in our example.
9 A VPN tunnel on the untrusted network ensures a secure connection between the WAN
side of each VPN router, i.e. the tunnel endpoints.
When the Rsync client on the local network runs its backup job, the Rsync request passes
through the VPN tunnel to the WAN port on the VPN router at the remote network. The remote
VPN router forwards the request (via TCP/UDP port 873) to the Rsync Server on the remote
network. In order to set this up, you typically need to create a gateway policy, which defines the
endpoints of the VPN tunnel, and a network policy, which defines the visibility of each private
network.
To create a remote gateway policy:
1. Log in to the local VPN router using your administrative credentials.
2. Navigate to the Gateway Policy section, as shown in Figure L.
Figure L: You need to define a remote gateway policy on the local VPN router.
3. Provide a descriptive name for the policy you’re creating, e.g. Remote Office Gateway.
4. Enter the IP address of the WAN side of the remote VPN router.
5. Enter the IP address of the WAN side of the remote VPN router.
6. Define the authentication method to use, typically a pre-shared key or an SSL certificate.
Kommentare zu diesen Handbüchern