Wholesale Partner Technical Guide



Similar documents
Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

VPN. VPN For BIPAC 741/743GE

Chapter 4 Virtual Private Networking

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Configuring IPsec VPN with a FortiGate and a Cisco ASA

WAN Data Link Protocols

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Case Study for Layer 3 Authentication and Encryption

Virtual Private Network and Remote Access Setup

Chapter 5 Virtual Private Networking Using IPsec

LAN-Cell to Cisco Tunneling

Chapter 8 Virtual Private Networking

How To Understand And Understand The Security Of A Key Infrastructure

Understanding the Cisco VPN Client

Application Note: Onsight Device VPN Configuration V1.1

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Lab a Configure Remote Access Using Cisco Easy VPN

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

IP Office Technical Tip

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Lecture 17 - Network Security

Virtual Private Network (VPN)

Cisco CCNA Optional Semester 4 Labs Wide Area Networking LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes)

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

L2F Case Study Overview

VPNC Interoperability Profile

STONEGATE IPSEC VPN 5.1 VPN CONSORTIUM INTEROPERABILITY PROFILE

This is a guide on how to create an IPsec VPN tunnel from a local client running Shrew Soft VPN Client to an Opengear device.

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Netopia TheGreenBow IPSec VPN Client. Configuration Guide.

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

VPN. Date: 4/15/2004 By: Heena Patel

Using a VPN with Niagara Systems. v0.3 6, July 2013

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Configure ISDN Backup and VPN Connection

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

CCNA Security 1.1 Instructional Resource

Monitoring Remote Access VPN Services

Magnum Network Software DX

Guideline for setting up a functional VPN

How To Industrial Networking

This chapter describes how to set up and manage VPN service in Mac OS X Server.

How To Configure Apple ipad for Cyberoam L2TP

This topic discusses Cisco Easy VPN, its two components, and its modes of operation. Cisco VPN Client > 3.x

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Common Remote Service Platform (crsp) Security Concept

How to configure VPN function on TP-LINK Routers

ISG50 Application Note Version 1.0 June, 2011

axsguard Gatekeeper IPsec XAUTH How To v1.6

Introduction to Security and PIX Firewall

Introduction. Technology background

Configuring a GB-OS Site-to-Site VPN to a Non-GTA Firewall

Chapter 6 Basic Virtual Private Networking

Virtual Private Network and Remote Access

How to configure VPN function on TP-LINK Routers

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance

Cisco Which VPN Solution is Right for You?

VPN Tracker for Mac OS X

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Industrial Classed H685 H820 Cellular Router User Manual for VPN setting

The BANDIT Products in Virtual Private Networks

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

Network Services Internet VPN

OfficeConnect Internet Firewall VPN Upgrade User Guide

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

T1 Networking Made Easy

VPN Configuration Guide. Cisco ASA 5500 Series

Overview. Protocols. VPN and Firewalls

Virtual Private Networks

Configuring a Leased Line

Cisco QuickVPN Installation Tips for Windows Operating Systems

Sophos UTM. Remote Access via SSL. Configuring UTM and Client

Cisco RV 120W Wireless-N VPN Firewall

How To Configure L2TP VPN Connection for MAC OS X client

Wireless VPN White Paper. WIALAN Technologies, Inc.

Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm

Authenticating a Lucent Portmaster 3 with Microsoft IAS and Active Directory

Understand Wide Area Networks (WANs)

Technical Notes TN 1 - ETG FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Internet Privacy Options

IP Office Technical Tip

TheGreenBow IPsec VPN Client. Configuration Guide Cisco RV325 v1. Website: Contact:

Using a VPN with CentraLine AX Systems

TABLE OF CONTENTS NETWORK SECURITY 2...1

Introduction to Computer Security

VPN Configuration Guide. Dell SonicWALL

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Transcription:

Wholesale Partner Technical Guide

Initiating Contact Wholesale Customer Connectivity The first step in initiating the process for establishing a connection with your company and FairPoint Communications in order to receive Daily Usage Files (DUF) is to contact your FairPoint Communications Account Manager. He/She will contact the IT Production Control Department at FairPoint, who will send an Accessible Letter. The Accessible Letter is a document used to gather information needed in order to ensure that you will receive all of the same data type and volume that you are receiving today from Verizon. The Accessible Letter also requests information for contacts from your company who will be working with the FairPoint IT Network team to establish connectivity between your company and FairPoint that will be used for file transfers. Once you have completed the Accessible Letter, email it to billingconnectivity@fairpoint.com. Sample Files Sample files for each file type that your company is currently receiving from Verizon currently should be sent via email to mailto:billingproduction@fairpoint.com. Connectivity Depending on the connectivity option you chose on the Accessible Letter, FairPoint IT Billing Production will send either a Connectivity/Dedicated Circuit Access Request Form or a Connectivity/VPN Access Request Form for you to complete. To begin, development connectivity will be established for all wholesale partners for testing purposes. FairPoint will send test data via email during the period that connectivity is being established. Once testing is successful, a production connection will then be established. FairPoint Communications offers the following connectivity/file transfer options: Dedicated Circuit using NDM The current turnaround time for this option is 6-8 weeks Once you ve selected the option to utilize a Dedicated Circuit using NDM for file transfers, FairPoint IT Production Control will send a Connectivity/Dedicated Access Request form for you to complete. Once complete, the form should be sent to billingconnectivity@fairpoint.com. The completed form will be sent to FairPoint IT Security for approval. Once the Connectivity/Dedicated Access Request form has been approved by FairPoint IT Security, a conference call will be scheduled to complete the Dedicated Circuit. Technical contacts from FairPoint and your company should be included on this call. 1

VPN Tunnel using NDM This process can be completed within a few days of receiving your completed Connectivity/VPN Access Request Form Once you ve selected the option to utilize a VPN Tunnel using NDM, FairPoint IT Production Control will send a Connectivity/VPN Access Request form for you to complete. Once complete, the form should be sent to billingconnectivity@fairpoint.com. The completed form will be sent to FairPoint IT Security for approval. During the time the form is out for approval, the technical contact from your company can begin setting up your company s end of the VPN tunnel. The VPN tunnel is a Business to Business VPN connection for all wholesale partners. Configurations can be found on page two of the Connectivity/VPN Access Request Form. Once the Connectivity/VPN Access Request form has been approved by FairPoint IT Security, a conference call will be scheduled to complete the VPN tunnel. Technical contacts from FairPoint and your company should be included on this call. Once the call takes place, the tunnel has been established and the call has ended, the FairPoint IT Network team member will contact the technical member from your company to exchange a Pre- Shared Key. The information will be stored on both ends of the tunnel. At this point, the VPN tunnel will be complete and ready to test sample files using NDM. Pre Shared Key Exchange If your company will be using a VPN tunnel for file transfers, a member of the FairPoint Network IT team will contact the technical contact from your company to exchange a Pre Shared key. This should be done with only the two technical contacts over the telephone. VPN Tunnel using SFTP This process can be completed within a few days of receiving your completed Connectivity/VPN Access Request Form. If your file transfer option includes sftp you will need to generate a pair of Secure Keys. This process will generate both a public and private key. The public key should be emailed to billingconnectivity@fairpoint.com. Generating Secure Keys - When the user tries to authenticate him/her self, the server checks for matching public keys and sends a challenge to the user end. The user is authenticated by signing the challenge using her private key. Remember that your private key file is used to authenticate you. Never expose your private keys. If anyone else can access your private key file, they can attempt to login to the remote host computer as you, and claim to be you. Therefore it is extremely important that you keep your private key file in a secure place and make sure that no one else has access to it. Once you ve selected the option to utilize a VPN Tunnel using SFTP, FairPoint IT Production Control will send a Connectivity/VPN Access Request form for you to complete. Once complete, the form should be sent to billingconnectivity@fairpoint.com. The completed form will be sent to FairPoint IT Security for approval. 2

During the time the form is out for approval, the technical contact from your company can begin setting up your company s end of the VPN tunnel. The VPN tunnel is a Business to Business VPN connection for all wholesale partners. Configurations can be found on page two of the Connectivity/VPN Access Request Form. Once the Connectivity/VPN Access Request form has been approved by FairPoint IT Security, a conference call will be scheduled to complete the VPN tunnel. Technical contacts from FairPoint and your company should be included on this call. Once the call takes place, the tunnel has been established and the call has ended, the FairPoint IT Network team member will contact the technical member from your company to exchange a Pre- Shared Key. The information will be stored on both ends of the tunnel. At this point, the VPN tunnel will be complete and ready to test sample files using SFTP. Pre Shared Key Exchange If your company will be using a VPN tunnel for file transfers, a member of the FairPoint Network IT team will contact the technical contact from your company to exchange a Pre Shared key. This should be done with only the two technical contacts over the telephone. File Retrieval Username & Password Once all required forms/public key information has been received by FairPoint and connectivity has been established, you will be issued a username and password that will be used to log into a directory that has been created for your company by FairPoint IT in order to retrieve your files. Testing The FairPoint IT Production Control team will place a test file into your directory. This file should be used for comparison with files currently being received from Verizon so that you can provide feedback to FairPoint Billing Production. Please email billingconnectivity@fairpoint.com with any questions you may have regarding this process. 3

Accessible Letter Example Name of your Company: XYZ Company ACNA: Access Carrier (or Customer) Abbreviation CIC: Carrier Identification Code List of OCNs: Operating Company Number Type of Business: Independent Tel. Co/UNE-P/ Reseller/CLEC/Other (please specify) 1) What is the approx. monthly volume of records that you currently send to and/or receive from Verizon? Please provide Messages, Minutes, and Frequency (daily/weekly/monthly). How many records are you currently receiving from Verizon today? List in detail, how many messages, minutes and how often you are currently receiving them. 2) What type of records are you currently sending to and/or receiving from Verizon? Please provide the category, group and record types for EMI record layouts, sample files for these records, as well as any associated reports. Example: File Type Messages Minutes UNE Access Records 2,400,000 5,400,000 Resale Daily Usage (RDUF) 148,000 302,000 UNE-P Daily Usage File 26,000 43,000 3) Is there a specific file-naming convention you need FairPoint to follow, when the files are sent to you? Please provide the details. Also, please specify the file-naming convention, if any, that you use for sending files to Fairpoint. Example: State ME NH VT File Name Requested DUF.101708.ME DUF.101708.NH DUF.101708.VT 4

4) Via what method are you expecting to send/receive these files? If the method is FTP/SFTP, please provide the IP address of the machine/server. What method of transmission are you planning to use in order to retrieve your files from FairPoint? NDM Network Data Mover (Known at FairPoint as Connect: Direct) SFTP Secure (SSL) File Transfer Protocol 5) If you are using an outside vendor to send/receive your data files please provide the following: Vendor Name: Vendor Data Center Address: Vendor Email: Vendor Telephone Number If you currently use a vendor to process your files, please provide their contact information above. Please note: If you do not use a vendor for all of your files, please note which files your vendor processes for you in this section. 6) Contact with Your Company that will be implementing a connection between your company and FairPoint. Name: Address: Telephone Number: Email: Please provide the contact information for the technical support person from your company who will be establishing either a Dedicated Circuit or a VPN Tunnel with FairPoint. 7) Please provide a general contact for your company who is responsible for retrieving files from FairPoint: Name: Telephone Number: Email: 5

8) Please list a contact for your company for after hours emergencies below: After Hours Contact Name: Telephone Number: Email: 9) Are you connected through a Mainframe or a PC type of system? Please list what type of equipment will you be using to retrieve files from FairPoint? 10) If your platform is a PC or Unix System please provide the directory where you would like to have the files sent Directory: Sub-directories: List a directory/sub-directory where you would like FairPoint to send your files here. 6

S A M P L E Connectivity / VPN Access Request Form Please complete all required information Type of VPN Access Requested: X Business-to-Business VPN: Used for Wholesale Customer Connections For more than 5 concurrent users Application-to-application connections available VPN Tunnel Client / SSL VPN Appropriate for 5 or less concurrent users Application-to-application connections available Local area network (LAN) printing may be allowed Other If this is a B2B VPN Request: Review FairPoint Communications standards for B2B VPN connections in Addendum A. Complete the information requested in Addendum B. If this is a Client / SSL VPN Request: Complete the information requested in Addendum C. 7

This area contains necessary information required to establish your end of the VPN tunnel ADDENDUM A FairPoint Communications Standards for B2B VPN Configurations IKE Policies (DO NOT MODIFY) PHASE 1 Parameter Message encryption algorithm Message integrity (hash) algorithm Peer authentication method Key exchange parameters (Diffie-Hellman group identifier and Perfect Forward Secrecy Group) Value Triple-DES SHA Preshared key Group 2 (1024-bit) NOTE: FairPoint Communications will provide the pre-shared key to be used with each Supplier. FairPoint Communications reserves the right to change this key and/or the method for obtaining this key at its discretion. IPSec Parameters (DO NOT MODIFY) PHASE 2 Parameter Security-association (SA) establishment IPSec Mode Mechanism for payload ESP transform Hashed Message Authentication Code Value ipsec-isakmp (IKE) Tunnel ESP ESP-3DES ESP-SHA-HMAC 8

Please complete all highlighted areas on this page ADDENDUM B Business-to-Business VPN Connection Addendum B Date Requested: Company : Communication Contact Name: John Doe Contact Email: John.Doe@Communication.com Contact Phone: 123-456-7890 How many users will be using the B2B VPN connection? 1 What is your external, Internet-facing IP address(s)? 1.2.3.4 (Public IP Address) Peer Address: 1.2.3.4 (VPN or Firewall External Address) Peer Network: 5.6.7.8 (NATed or public IP) Technical Contact Name: John Doe Technical Contact Email: John.Doe@Communication.com Technical Contact Phone: 123-456-7890 Technical Contact Cell Phone: 123-456-7890 What type of device (make/model) do you plan to terminate your Cisco ASA 5520 VPN connection on? What type of connection do you have to the Internet? I Gig (e.g. leased line, DSL, dial-up) Do you have an existing connection (private line circuit, VPN, etc.) No between your company and FairPoint Communications or its affiliates? If yes, what networks IP addresses of yours do we route to via that connection? Will this new VPN be replacing this connectivity, or are we introducing a new route to you via the tunnel? What are the FairPoint Communications network addresses you will you need to access? Note: This should be a summary of the FairPoint Communications Networks identified by the System/Application/ or Business owner 9.10.11.12/32 *** If unsure, please ask your FairPoint Communications Sponsor as you will need this information to configure your end of the VPN Tunnel. 9

This page to be completed by FairPoint personnel ADDENDUM B Business-to-Business VPN Connection (cont.) FairPoint Supervisor or Above: Title: Email: Business Purpose of Access: Date: Department: Phone: Duration of Access: from (Date): To (Date): Note: Needs to be re-verified every 6 months FairPoint Employee Contact Name: Site Location: Title Email: Telephone: Has FRP Mutual Confidentiality and Non-Disclosure Agreement been signed by this vendor (Required): Yes No Please provide VPN access for the above. I understand that I will be held responsible for all actions of the group/individual in accessing the FRP Network. All signatures (on the Signature Page Only, page 6 of 6) are required for approval. Please print, sign and return completed form via fax to FairPoint IT Security Director at 620-339-4719. 10

No information needed from wholesale customers on this page ADDENDUM C Client / SSL VPN Request: Access Company : Client SSL VPN Request Type Date of Request: Individuals Name: Individuals Title: Individuals Email: Individual Phone: Individual Signature: Host IP(s) / System/ or Application on FairPoint side (s): ***If unsure, please ask your FairPoint Communications Sponsor as you will need this information to complete the request Supervisor s Name: Supervisor s Email: Supervisor Signature: Business Purpose of Access: Supervisor s Title: Supervisor s Phone: Duration of Access: from (Date): To (Date): Note: Needs to be re-verified every 6 months FairPoint Employee Contact Name: Site Location: Title Email: Telephone: Has FRP Mutual Confidentiality and Non-Disclosure Agreement been signed by this vendor (Required): Yes No Please provide group/individual VPN access for the above. I understand that I will be held responsible for all actions of the group/individual in accessing the FRP Network. 11

Please print and sign your name in the Employee Vendor area on this page. SIGNATURE PAGE ONLY FairPoint Supervisor: Print: Signature: System / Application owner: Print: Signature: Employee/Vendor: Print: Signature: Director IT Network: Print: Signature: Director of Information Security: Print: Signature: Network Administrator who Completed Request: Print: Signature: If needed - RSA Token Issued - IS Security Team Member who issued token: Print: Signature: 12

SAMPLE CONNECTIVITY / DEDICATED ACCESS REQUEST FORM Please complete all required information Type of Access Requested: Point-to-Point T1: ADDENDUM A Dedicated Access Request Connection Addendum A REQUESTING COMPANY INFORMAITON Company Name: Communication Contact Name: John Doe Contact E-mail: John.Doe@communication.com Contact Number: 123-456-7890 TECHNICAL CONTACT SECTION: Technical Contact Name: John Doe Technical Contact E-mail: John.Doe@communication.com Technical Contact Phone: 123-456-7890 Technical Contact Cell Phone: 123-456-7890 CONFIGURATION SECTION: Your Router Gateway Ethernet Port: G0/0 IP Address on you LAN 192.x.x.x Segment Your Router Serial Interface (s0/0 or s1/0 ): S1/0 IP Address assigned to 194.165.x.x your Serial Interface DNS CONFIGURATION (if required) Primary DNS Resolver: 4.2.x.x Secondary DNS Resolver: 4.1.x.x Your Circuit ID: DHEC-123456 xxxx Cisco Router Configuration: 13

Encapsulation (HDLC): PPP IP Classless (in the global Yes configuration): Default Route: (0.0.0.0 0.0.0.0 Serial 1 or whatever interface is connected to your CSU/DSU or MUX. CIRCUIT CONFIGURATION: Net Signal: (ESF Extended Super Frame) Line Coding: (B8ZS Bipoler 8 zeros substitution) Timing: (Net from the Network) Port Base Rate: (64K 1 ch = 56k, 2 or more 64k each channel) Port Speed: (1.5 mb/s Total Bandwidth Speed) Channel Allocations: (Assign # 1 to 24) LBO (0.0db If cat 5 or 6 < 50ft default in most units, if > next setting 7.5db Yes Yes Serial N/A 1.54 1-24 14

SIGNATURE PAGE FairPoint Supervisor: Print: Signature: System / Application owner: Print: Signature: Employee/Vendor: Print: John Doe Signature: John Doe Director IT Network: Print: Signature: Director of Information Security: Print: Signature: Network Administrator who Completed Request: Print: Signature: 15

Glossary of Terms Accessible Letter A form used to provide necessary information for a Wholesale Partner to select a preferred delivery method and begin the process of establishing connectivity to the FairPoint billing systems and begin the migration process. ACNA - Access Carrier (or Customer) Name Abbreviation A three-character code assigned to each Interexchange Carrier; designates the customer to which circuits are billed. CIC - Carrier Identification Code A unique three- or four-digit access identification code that is assigned by Telcordia Technologies for use with certain switched access services. The CIC identifies the caller's long distance carrier. CLEC - Competitive Local Exchange Carrier Any company or person authorized to provide local exchange services in competition with an ILEC. A CLEC provides similar or identical telecommunications services to the ILEC. Connect: Direct - A direct electronic method of delivering CLEC and Reseller usage data files and Reseller bills, and transmitting CLEC ASRs. Available in several platforms including NDM-MVS for mainframe and NDM-PC for personal computers. Also known as Network Data Mover (NDM). Dedicated Circuit - A communications cable or other facility dedicated to a specific application. Dedicated Circuit Access Request Form - A form that provides the necessary information for a company to begin the process of establishing connectivity to the FairPoint billing systems and begin the migration process. DUF Daily Usage Files: Daily reports providing data enabling CLECs to bill end users for usage charges incurred. Independent Telephone Co. - An independent company providing local exchange telecommunications service. NDM - Network Data Mover A direct electronic method of delivering CLEC and Reseller usage data files and Reseller bills, and transmitting CLEC Access Service Requests (ASR). Available in several platforms including NDM-MVS for mainframe and NDM-PC for personal computers. Also known as Connect: Direct. 16

Glossary of Terms Continued OCN - Operating Company Number (OCN) A four-character code assigned by the National Exchange Carrier Association (NECA) to a telecommunications provider. Specifically used to identify CLEC and Reseller usage data. Also known as Company Code. Pre-Shared Key - Cryptography, a pre-shared key or PSK is a shared secret (a piece of data only known to the parties involved in a secure communication. The shared secret can be a password, a passphrase, a big number or an array of randomly chosen bytes. A Pre-Shared Key is only used for VPN connections. Reseller - A business entity that purchases telecommunications services at wholesale and sells them to third parties; a service provider that does not own transmission facilities, but obtains communications services from a carrier for resale to the public for profit. Also known as a Resale Carrier. Secure Key - Based on the use of digital signatures. Each user creates a pair of 'key' files. One of these key files is the user's public key, and the other is the user's private key. The server knows the user's public key, and only the user has the private key. SFTP A network protocol designed to provide secure file transfer and manipulation facilities over the secure shell (SSH) protocol. UNE - Unbundled Network Element Specific equipment and facilities that are "unbundled" from traditional end-to-end services (such as residential dial tone service) in order to allow other local exchange carriers to use components of another network. An example of a network element would be a loop connected to a competitor carrier's switch. UNE-P - Unbundled Network Element-Platform A service offering that combines elements that can be used to build a variety of platforms. UNE-P is also known as 'platform'. VPN Access Request Form - A form that provides the necessary information for a company to begin the process of establishing connectivity to the FairPoint billing systems and begin the migration process. VPN Tunnel - A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The link-layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features. 17