Providing Teleworker Services

Slides:



Advertisements
Similar presentations
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Prototyping the WAN Designing and Supporting Computer Networks – Chapter 8.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 2: Teleworker Connectivity.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 2: Teleworker Connectivity.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
D-1 Management Information Systems for the Information Age Second Canadian Edition Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Communications and Networks
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 6: Broadband Solutions.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Communications & Networks
T F 1. Cable Internet requires a satellite dish.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Broadband Solutions Connecting Networks.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Communications and Networks Chapter 9. CE06_PP09-2 Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution, and communication systems.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Chapter 7 Connecting to the Internet. Connecting to the Internet FAQs: – What is the Internet? – What are the options for Internet service? – What is.
Extended Learning Module D
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
Module 5: Configuring Access for Remote Clients and Networks.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Communications and Networks
Chapter 7 Connecting to the Internet. 2Practical PC 5 th Edition Chapter 7 Getting Started In this Chapter, you will learn: − What is the Internet − Options.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
Virtual Private Networks Manraj Sekhon. What is a VPN?
IS3220 Information Technology Infrastructure Security
Wireless Wide Area Network. Cell Phones A necessity in today’s society Advanced Radios Full Duplex Communication.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Chapter 1: Explore the Network
Services in a Converged WAN
Instructor Materials Chapter 1: WAN Concepts
Instructor Materials Chapter 1: WAN Concepts
Instructor Materials Chapter 1: Explore the Network
Providing Teleworker Services
Networking in the Enterprise
Networking in the Enterprise
Providing Teleworker Services
Virtual Private Networks (VPN)
Virtual Private Network
Network Infrastructure
Planning & System Installation
Chapter 1: Explore the Network
Module 2: Configure Network Intrusion Detection and Prevention
Planning & System Installation
Chapter 4: Wireless LANs
Virtual Private Networks (VPN)
Planning & System Installation
Chapter 1: WAN Concepts Connecting Networks
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network
Providing Teleworker Services
09/12/2018 Virtual Networks.
Providing Teleworker Services
Configure a Wireless Router
Configure a Wireless Router
Vpn’s Virtual private network is a private network that extends across a public network or internet which enables people to send and receive data across.
Providing Teleworker Services
Presentation transcript:

Providing Teleworker Services Accessing the WAN – Chapter 6

Describe the Enterprise Requirements for Providing Teleworker Services The benefits of teleworkers for business, society and the environment. Graphics 6.1.1.1 (use this if you don’t want to make the changes that I recommend below) The above objective is too long and wordy. Consider breaking it down into 2 objectives for example: Describe the benefits of teleworkers for business, society and the environment (graphic 6.1.1.1) List remote connection technologies and describe scenarios in which each would be implemented (graphic 6.1.2.1)

Describe the Enterprise Requirements for Providing Teleworker Services Remote connection technologies and scenarios in which each would be implemented.

Describe the Enterprise Requirements for Providing Teleworker Services The key differences between private and public network infrastructures Graphic 6.1.2.2

Explain How Broadband Services extend Enterprise Networks How broadband services allow teleworkers to use the Internet to connect to the Enterprise WAN Graphic 6.2.1.1

Explain How Broadband Services extend Enterprise Networks How Enterprises use cable connectivity to extend their reach Graphic 6.2.2.1

Explain How Broadband Services extend Enterprise Networks How Enterprises use DSL connectivity to extend their reach Graphics 6.2.3.1 & 6.2.3.2

Explain How Broadband Services extend Enterprise Networks How Enterprises use broadband wireless connectivity to extend their reach Graphic 6.2.4.2

Explain How Broadband Services extend Enterprise Networks How Enterprises defend themselves from threats to wireless network security Graphic 6.2.4.3

Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting The importance and benefits of VPN technology Graphics 6.3.1.1 & 6.3.1.2

Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting Compare site-to-site VPNs to remote-access VPNs Graphics 6.3.2.1 & 6.3.2.2

Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting The hardware and software components that typically make up a VPN Graphic 6.3.3.1

Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting The characteristics of secure VPNs Graphic 6.3.4.1

Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting The concept of VPN tunneling Graphic 6.3.5.1

Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting The concept of VPN encryption Graphic 6.3.6.1

Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting The concept of IPsec Protocols Graphic 6.3.7.1

Summary Requirements for providing teleworker services are: Maintains continuity of operations Provides for increased services Secure & reliable access to information Cost effective Scalable Components needed for a teleworker to connect to an organization’s network are: Home components Corporate components

Summary Broadband services used Cable transmits signal in either direction simultaneously DSL requires minimal changes to existing telephone infrastructure delivers high bandwidth data rates to customers Wireless increases mobility wireless availability via: municipal WiFi WiMax satellite internet

Summary Securing teleworker services VPN security achieved through using Advanced encryption techniques Tunneling Characteristics of a secure VPN Data confidentiality Data integrity authentication