You are on page 1of 13

SAP ANALYTIC CLOUD AGENT(SAC)

The SAP Analytics Cloud, on-premise


access agent (SAP Analytics Cloud agent)
is a connectivity component. SAP
Analytics Cloud agent is an on-premise
data connectivity component that is used
to establish import data connections for
these data sources:
•SAP HANA.
•SAP Business Planning and
Consolidation, version for Microsoft
Platform (BPC MS).
•SAP Business Warehouse (BW).
•SAP Business Objects Business
Intelligence Universes (UNX).
•SAP Enterprise Resource
•Planning (ERP).
•SQL databases.
•File servers.
DATA PROVISIONING AGENT
Data Provisioning in simple terms means the act of bringing data or being
able to access the data from source system to the target system without the
interference of the data warehouse
https://blogs.sap.com/2020/04/08/sdi-dp-agent-and-remote-source-
configuration-in-hana-to-read-data-from-s-4hana/
SAP DATA SERVICE AGENT

The SAP Data Services Agent provides secure connectivity to on-


premise sources in your landscape.
TYPES OF VPN IN AZURE
Four types of vpn in azure
https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-vpn-faq
1.POINT TO SITE: Point-to-Site VPN connections are useful when you want to
connect to your VNet from a remote location, such when you are telecommuting from
home or a conference. Point-to-Site connections do not require a VPN device or a public-
facing IP address
2.SITE TO SITE: configurations are between your on-premises location and Azure.
This means that you can connect from any of your computers located on your premises
to any virtual machine or role instance within your virtual network, depending on how
you choose to configure routing and permissions.
3.MULTISITE:This is a variation of a Site-to-Site configuration that allows you to
connect multiple on-premises sites to a virtual network
4.EXPRESS ROUTE: Express Route is a private connection to Azure from your WAN,
not a VPN connection over the public Internet
TYPES OF VPN IN AWS
Two types of vpn’s in aws
https://aws.amazon.com/vpn/features/
1.CLIENT VPN:AWS Client VPN is a fully-managed remote access VPN solution used by your remote
workforce to securely access resources within both AWS and your on-premises network. Fully elastic, it
automatically scales up, or down, based on demand. When migrating applications to AWS, your users access
them the same way before, during, and after the move. AWS Client VPN, including the software client,
supports the OpenVPN protocol.
2.Site-to-Site VPN: AWS site to site is a fully-managed service that creates a secure
connection between your data center or branch office and your AWS resources using
IP Security (IPSec) tunnels. When using Site-to-Site VPN, you can connect to both
your Amazon Virtual Private Clouds (VPC) as well as AWS Transit Gateway, and
two tunnels per connection are used for increased redundancy
TYPES OF VPN IN CLOUD
TWO TYPES OF CLOUD VPN GATEWAYS
https://cloud.google.com/network-connectivity/docs/vpn/concepts/overview
1.HA VPN:HA VPN is a high-availability (HA) Cloud VPN solution that lets you
securely connect your on-premises network to your VPC network through an IPsec
VPN connection in a single region. HA VPN provides an SLA of 99.99% service
availability.
2.CLASSIC VPN:With Classic VPN, your on-premises hosts communicate
through one or more IPsec VPN tunnels to Compute Engine virtual
machine (VM) instances in your project's Virtual Private Cloud (VPC) networks..
The peer IP address is the IP address of the device that the VPNs will terminate at
So, if your Cisco ASA has the IP address 172.22.1.2, the Juniper will use this as the
peer address. You will need to use the IP address 172.22.2.2 as the peer address at
your end, as that will point all VPN traffic at the Juniper device.
AMAZON VPC
Amazon Virtual Private Cloud (Amazon VPC) enables you to launch AWS
resources into a virtual network that you've defined.A VPC peering
connection is a networking connection between two VPCs that enables you
to route traffic between them using private IPv4 addresses or IPv6 addresses.
https://docs.aws.amazon.com/vpc/latest/peering/what-is-vpc-peering.html
AZURE VNP
Virtual network peering enables you to seamlessly connect two or more 
Virtual Networks in Azure. The virtual networks appear as one for connectivity
purposes. The traffic between virtual machines in peered virtual networks uses the
Microsoft backbone infrastructure
Azure supports the following types of peering:
• Virtual network peering: Connect virtual networks within the same Azure region.
• Global virtual network peering: Connecting virtual networks across Azure
regions.
CONFIGURE A VNET-TO-VNET VPN
Virtual networks can be in different regions and from different subscriptions. When
you connect VNets from different subscriptions, the subscriptions don't need to be
associated with the same Active Directory tenant.
VPN TUNNEL
A VPN tunnel is an encrypted link between your computer or mobile device and an
outside network.
https://us.norton.com/internetsecurity-privacy-what-is-a-vpn-tunnel.html
https://www.netmotionsoftware.com/blog/connectivity/vpn-protocols
How?
A VPN tunnel connects your smartphone, laptop, computer, or tablet to another network
in which your IP address is hidden and all the data you generate while sur
1.Point to Point Tunneling Protocol — better known as PPTP — is one of the oldest
versions still in use today. The strength of this protocol is its speed: It features extremely
fast connection speeds.
2. Layer 2 Tunneling Protocol(L2TP/IPSec) when used with Internet Protocol
Security, is a step up from basic PPTP. That's because this level of tunneling protocol
offers two stages of protection: Both the L2TP and IPSec portions of this protocol create
their own encryption. This results in two layers of protection for your online data.
3,Secure Socket Tunneling Protocol (SSTP):It is unusual because it is only
available on Windows operating systems. This type of tunneling protocol is very
secure, making it a safe choice. It also doesn't use fixed ports, so it's easier for SSTP
to get through firewalls.
4.OpenVPN
OpenVPN is an open source protocol that allows developers access to its underlying
code. This protocol has grown in popularity due to its use of (virtually unbreakable)
AES-256 bit key encryption with 2048-bit RSA authentication and a 160-bit SHA1
hash algorithm.
5.IKEv2
Internet Key Exchange version 2 is a common VPN tunneling protocol that provides
a secure key exchange session. Similar to L2TP (and IKEv1), IKEv2 is normally
paired with IPsec for encryption and authentication. This protocol is very good at re-
establishing the link after temporary connection loss and excels at switching
connections across network types (from WiFi to cellular, for example).

You might also like