Instructor & Todd Lammle

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Chapter 5 Networks. Learning Objectives After reading this chapter the reader should be able to: Understand the importance of networks in the field of.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Prototyping the WAN Designing and Supporting Computer Networks – Chapter 8.
SCSC 455 Computer Security Virtual Private Network (VPN)
Internet Security Seminar Class CS591 Presentation Topic: VPN.
CCNA 5.0 Planning Guide Chapter 7: Securing Site-to-Site Connectivity
Instructor & Todd Lammle
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Secure remote access to applications through any web browser Internet Headquarters SSL Customers Suppliers Partners Mobile Workforce Applications .
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Sybex ICND2/CCNA R/S Chapter 21: Wide Area Networks Instructor & Todd Lammle.
Instructor & Todd Lammle
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Cisco Certified Network Associate CCNA Access the WAN Asst.Prof. It-arun.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Intro to WAN VCC Semester 4, Chapter 2. Service providers Central Office (CO): Each telephone connects to a single point called a CO. Local Loop.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Wide Area Network Chapter 15 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Describe different methods for connecting.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
Sybex CCNA Chapter 2: Ethernet Networking and Data Encapsulation Instructor & Todd Lammle.
Wide Area Networks (WAN) Terms that are commonly used by service providers: Customer premises equipment (CPE) Equipment that’s owned by the subscriber.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Chapter 1: Explore the Network
Instructor Materials Chapter 1: WAN Concepts
Instructor Materials Chapter 1: WAN Concepts
Instructor Materials Chapter 3: Branch Connections
Virtual Private Networks
Instructor Materials Chapter 1: LAN Design
Point-to-Point Protocol (PPP)
Instructor Materials Chapter 2: Point-to-Point Connections
Providing Teleworker Services
Virtual Private Network (VPN)
Instructor Materials Chapter 2: Point-to-Point Connections
Module 2: Configure Network Intrusion Detection and Prevention
Providing Teleworker Services
Instructor & Todd Lammle
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Chapter 2: Point-to-Point Connections
Chapter 1: WAN Concepts Connecting Networks
Instructor & Todd Lammle
Chapter 3: Branch Connections
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
The Business Value of MPLS VPNs
Seminar Class CS591 Presentation Topic: VPN
Virtual Private Network
Instructor & Todd Lammle
Instructor & Todd Lammle
Providing Teleworker Services
Connectivity methods. Connectivity methods Exam Answer WAN/LAN  Each office will have its own Local Area Network or LAN.  But the company also wants.
Cisco networking CNET-448
Providing Teleworker Services
Chapter 10: Advanced Cisco Adaptive Security Appliance
Virtual Private Networks (VPN)
Topic 12: Virtual Private Networks
Providing Teleworker Services
Presentation transcript:

Instructor & Todd Lammle CCNA Routing and Switching Study Guide Chapters 7 & 21: Wide Area Networks Instructor & Todd Lammle

Chapter 21 objectives The ICND2 topics covered in this chapter include: 2

Chapter 21 objectives (con’t) The ICND2 topics covered in this chapter include: 3

New figure 7.1/21.1

New figure 7.2/21.2

New figure 7.3/21.3

WAN terms

WAN connection types

Broadband access using cable or DSL

Cable network and terms

xDSL connection from home user to central office xDSL connection from home user to central office. All types of DSL are layer 1 technologies.

PPPoE with ADSL

DTE-DCE-DTE WAN DTE-DCE-DTE WAN connection: Clocking is typically provided by the DCE network to routers. In nonproduction environments, a DCE network is not always present.

Cisco’s HDLC frame format: Each vendor’s HDLC has a proprietary data field to support multiprotocol environments.

Configuring Cisco’s HDLC proprietary WAN encapsulation Corp(config)#int s0/0 Corp(config-if)#ip address 172.16.10.1 255.255.255.252 Corp(config-if)#no shut   Corp#sh int s0/0 Serial0/0 is up, line protocol is up Hardware is PowerQUICC Serial Internet address is 172.16.10.1/30 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation HDLC, loopback not set Keepalive set (10 sec)

PPP protocol stack compared to the OSI reference model.

PPP session establishment

PPP authentication example

Failed PPP authentication

Mismatched WAN encapsulations

Mismatched IP addresses

Example of using a VPN

Benefits of VPNs Security VPNs can provide very good security by using advanced encryption and authentication protocols, which will help protect your network from unauthorized access. IPsec and SSL fall into this category. Secure Sockets Layer (SSL) is an encryption technology used with web browsers, which has native SSL encryption, and are known as Web VPN. You can also use the Cisco AnyConnect SSL VPN client installed on your PC to provide a SSL VPN solution, as well as the Clientless Cisco SSL VPN. Cost Savings By connecting the corporate remote offices to their closest Internet provider, and then creating a VPN tunnel with encryption and authentication, I gain a huge savings over opting for traditional leased point-to-point lines. This also permits higher bandwidth links and security, all for far less money than traditional connections. Scalability VPNs scale very well to quickly bring up new offices or have mobile users connect securely while traveling or when connecting from home. Compatibility with broadband technology For remote and traveling users and remote offices, any Internet access can provide a connection to the corporate VPN. This allows users to take advantage of the high-speed Internet access of DSL or cable modems.

Generic Routing Encapsulation (GRE) tunnel structure

7.6 Branch Wan Challenges IT Trends – Branch Challenges Critical to your Business, WAN Bandwidth Expensive, Pressure Increasing Cloud Applications are Moving to the Data Center and Cloud Internet Edge is Moving to the Branch Branch Pressure to the WAN Data Center CLOUD MOBILITY APPS SaaS, Google Docs, Office365 Guest Wi-Fi, BYOD, APP updates Video, VDI, Backup

7.7 Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access MPLS (IP-VPN) Hybrid WAN Transport IPsec Secure Private Cloud Virtual Private Cloud Internet Branch Direct Internet Access Public Cloud Saves customers money – 6 month ROI Improves application response times Enables cloud, mobility, and BYOD in the branch

7.8 Transport Independent Intelligent Path Control AVC Internet Private Cloud 3G/4G-LTE Virtual Private Cloud Branch MPLS WAAS PfR Public Cloud Transport Independent Consistent operational model Simple Provider migrations Scalable and Modular design DMVPN IPsec overlay design Intelligent Path Control Application best path based on delay, loss, jitter, path preference Load Balancing for full utilization of all bandwidth Improved network availability Performance Routing (PfR) Application Optimization Application monitoring with Application Visibility and Control (AVC) Application Acceleration and bandwidth savings with WAAS Secure Connectivity Certified strong encryption Comprehensive threat defense with ASA and IOS Firewall/IPS Cloud Web Security (CWS) for scalable secure direct Internet access

MLP network layout, figure 7.18 S0/0: 172.16.10.1/30 S0/0: 172.16.10.2/30 MLP: 10.1.1.0/24 Corp SF S0/1: 172.16.10.9/30 S0/0: 172.16.10.9/30

Figure 7.21 Enterprise-managed VPNs

Figure 7.22: Provider-managed VPNs Layer 2 MPLS VPN (VPLS and VPWS): Customer routers exchange routes directly. Some applications need Layer 2 connectivity to work. Layer 3 MPLS VPN: Customer routers exchange routes with SP routers. It provides Layer 3 service across the backbone.

EBGP network layout, figure 7.25 AS=100 AS=1 192.168.1.2 Lo0: 10.0.1.0 192.168.1.1 R1 Lo0: 10.0.0.0 ISP 192.168.2.1 AS=200 192.168.2.2 Lo0: 10.0.2.0 R2

Written Labs and Review Questions Read through the Exam Essentials section together in class. Open your books and go through all the written labs and the review questions. Review the answers in class. 32