access agent (SAP Analytics Cloud agent) is a connectivity component. SAP Analytics Cloud agent is an on-premise data connectivity component that is used to establish import data connections for these data sources: •SAP HANA. •SAP Business Planning and Consolidation, version for Microsoft Platform (BPC MS). •SAP Business Warehouse (BW). •SAP Business Objects Business Intelligence Universes (UNX). •SAP Enterprise Resource •Planning (ERP). •SQL databases. •File servers. DATA PROVISIONING AGENT Data Provisioning in simple terms means the act of bringing data or being able to access the data from source system to the target system without the interference of the data warehouse https://blogs.sap.com/2020/04/08/sdi-dp-agent-and-remote-source- configuration-in-hana-to-read-data-from-s-4hana/ SAP DATA SERVICE AGENT
The SAP Data Services Agent provides secure connectivity to on-
premise sources in your landscape. TYPES OF VPN IN AZURE Four types of vpn in azure https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-vpn-faq 1.POINT TO SITE: Point-to-Site VPN connections are useful when you want to connect to your VNet from a remote location, such when you are telecommuting from home or a conference. Point-to-Site connections do not require a VPN device or a public- facing IP address 2.SITE TO SITE: configurations are between your on-premises location and Azure. This means that you can connect from any of your computers located on your premises to any virtual machine or role instance within your virtual network, depending on how you choose to configure routing and permissions. 3.MULTISITE:This is a variation of a Site-to-Site configuration that allows you to connect multiple on-premises sites to a virtual network 4.EXPRESS ROUTE: Express Route is a private connection to Azure from your WAN, not a VPN connection over the public Internet TYPES OF VPN IN AWS Two types of vpn’s in aws https://aws.amazon.com/vpn/features/ 1.CLIENT VPN:AWS Client VPN is a fully-managed remote access VPN solution used by your remote workforce to securely access resources within both AWS and your on-premises network. Fully elastic, it automatically scales up, or down, based on demand. When migrating applications to AWS, your users access them the same way before, during, and after the move. AWS Client VPN, including the software client, supports the OpenVPN protocol. 2.Site-to-Site VPN: AWS site to site is a fully-managed service that creates a secure connection between your data center or branch office and your AWS resources using IP Security (IPSec) tunnels. When using Site-to-Site VPN, you can connect to both your Amazon Virtual Private Clouds (VPC) as well as AWS Transit Gateway, and two tunnels per connection are used for increased redundancy TYPES OF VPN IN CLOUD TWO TYPES OF CLOUD VPN GATEWAYS https://cloud.google.com/network-connectivity/docs/vpn/concepts/overview 1.HA VPN:HA VPN is a high-availability (HA) Cloud VPN solution that lets you securely connect your on-premises network to your VPC network through an IPsec VPN connection in a single region. HA VPN provides an SLA of 99.99% service availability. 2.CLASSIC VPN:With Classic VPN, your on-premises hosts communicate through one or more IPsec VPN tunnels to Compute Engine virtual machine (VM) instances in your project's Virtual Private Cloud (VPC) networks.. The peer IP address is the IP address of the device that the VPNs will terminate at So, if your Cisco ASA has the IP address 172.22.1.2, the Juniper will use this as the peer address. You will need to use the IP address 172.22.2.2 as the peer address at your end, as that will point all VPN traffic at the Juniper device. AMAZON VPC Amazon Virtual Private Cloud (Amazon VPC) enables you to launch AWS resources into a virtual network that you've defined.A VPC peering connection is a networking connection between two VPCs that enables you to route traffic between them using private IPv4 addresses or IPv6 addresses. https://docs.aws.amazon.com/vpc/latest/peering/what-is-vpc-peering.html AZURE VNP Virtual network peering enables you to seamlessly connect two or more Virtual Networks in Azure. The virtual networks appear as one for connectivity purposes. The traffic between virtual machines in peered virtual networks uses the Microsoft backbone infrastructure Azure supports the following types of peering: • Virtual network peering: Connect virtual networks within the same Azure region. • Global virtual network peering: Connecting virtual networks across Azure regions. CONFIGURE A VNET-TO-VNET VPN Virtual networks can be in different regions and from different subscriptions. When you connect VNets from different subscriptions, the subscriptions don't need to be associated with the same Active Directory tenant. VPN TUNNEL A VPN tunnel is an encrypted link between your computer or mobile device and an outside network. https://us.norton.com/internetsecurity-privacy-what-is-a-vpn-tunnel.html https://www.netmotionsoftware.com/blog/connectivity/vpn-protocols How? A VPN tunnel connects your smartphone, laptop, computer, or tablet to another network in which your IP address is hidden and all the data you generate while sur 1.Point to Point Tunneling Protocol — better known as PPTP — is one of the oldest versions still in use today. The strength of this protocol is its speed: It features extremely fast connection speeds. 2. Layer 2 Tunneling Protocol(L2TP/IPSec) when used with Internet Protocol Security, is a step up from basic PPTP. That's because this level of tunneling protocol offers two stages of protection: Both the L2TP and IPSec portions of this protocol create their own encryption. This results in two layers of protection for your online data. 3,Secure Socket Tunneling Protocol (SSTP):It is unusual because it is only available on Windows operating systems. This type of tunneling protocol is very secure, making it a safe choice. It also doesn't use fixed ports, so it's easier for SSTP to get through firewalls. 4.OpenVPN OpenVPN is an open source protocol that allows developers access to its underlying code. This protocol has grown in popularity due to its use of (virtually unbreakable) AES-256 bit key encryption with 2048-bit RSA authentication and a 160-bit SHA1 hash algorithm. 5.IKEv2 Internet Key Exchange version 2 is a common VPN tunneling protocol that provides a secure key exchange session. Similar to L2TP (and IKEv1), IKEv2 is normally paired with IPsec for encryption and authentication. This protocol is very good at re- establishing the link after temporary connection loss and excels at switching connections across network types (from WiFi to cellular, for example).