HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.185 Selection of a suitable RAS system architecture

S 2.185 Selection of a suitable RAS system architecture

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: IT Security Management, Administrators

Depending on the planned operational scenarios, different RAS system architectures can be used to implement remote access to a LAN. The various system architectures inevitably have different characteristics and therefore differ as to which particular operational purposes they are suitable for. Theoretically every combination is possible, but the wrong choice could entail additional expense (e.g. the need to purchase additional hardware or more time spent on administrative tasks).

The RAS scenarios described below and to which in each case one typical system architecture can be assigned are commonly encountered in practice.

  1. Connection of individual computers to a LAN
  1. Connection of several computers to one LAN
  1. Connection of a computer or a LAN through a service provider
  1. Connection of a computer or a LAN over the Internet
  1. Setting up a Virtual Private Network (VPN)

The scenarios and system architectures presented above are variants that are commonly employed for the implementation of RAS access; however, they should be viewed only as examples. The actual choice of system architecture depends very much on the operational scenarios that are planned. Often there is also a requirement to accommodate several scenarios at the same time (e.g. telecommuters and mobile users). In particular, mobile users should be offered as much freedom as possible in the choice of access technology so as to ensure that they can access the local network from as many locations and work environments as possible.

However, from the point of view of IT security it should be borne in mind that the use of different access technologies generally also requires different access points in the destination LAN. Generally a LAN which has several external access points is exposed to a greater number of threats than a LAN which can only be accessed over a single external access. On the other hand, the fact that there are different access points enhances the availability of the RAS system.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
October 2000
home