Motivation
Deploy secure daemons when clients must connect securely over a non-secure network. This section illustrates example situations involving remote clients.
rvsd
rvsd—Secure Connections across Single Firewall depicts a hub and spoke architecture. An rvsd
hub runs on a firewall computer, and remote programs access the hub through secure TLS connections. This arrangement lets trusted remote programs communicate with servers and other programs inside the secure inner network. rvsd
bars untrusted programs from connecting to it.
Figure 117: rvsd—Secure Connections across Single Firewall
rvsrd
Figure 118: rvsrd—Secure Connections across Double Firewall
rvsrd—Secure Connections across Double Firewall depicts a situation with two Rendezvous routing daemons configured to cross a double firewall. Remote programs initiate secure TLS connections to a secure routing daemon hub (rvsrd
) within the outer firewall (DMZ network). A secure TLS neighbor link connects that secure routing daemon with an ordinary routing daemon (rvrd
) in the secure inner network.
To configure secure neighbor links, see SSL Connection with Compression.
To prevent rvsrd
from multicasting client messages within the DMZ network, start rvsrd
with the -no-multicast
option. For background information, see Disabling Multicast.
|
|