Providing Teleworker Services Accessing the WAN – Chapter 6
Objectives Enterprise requirements for providing teleworker services How broadband services (DSL, cable, and wireless) extend Enterprise Networks How VPN technology provides secure teleworker services
Enterprise Requirements Benefits of teleworkers
Enterprise Requirements Remote connection technologies
Enterprise Requirements Teleworker Connectivity Requirements
Broadband Services extend Enterprise Networks Broadband services allow teleworkers to use the Internet to connect to the Enterprise WAN
Broadband Services extend Enterprise Networks How Enterprises use cable connectivity to extend their reach
Broadband Services extend Enterprise Networks How Enterprises use DSL connectivity to extend their reach
Broadband Services extend Enterprise Networks Broadband wireless
Broadband Services extend Enterprise Networks Threats to wireless network security
Secure Teleworker Services Importance of VPN technology
Secure Teleworker Services Benefits of VPN technology
Secure Teleworker Services Site-to-site VPNs
Secure Teleworker Services Remote-access VPNs
Secure Teleworker Services Hardware and software components of a VPN
Secure Teleworker Services Characteristics of secure VPNs
Secure Teleworker Services VPN tunneling
Secure Teleworker Services VPN encryption
Secure Teleworker Services IPsec Protocols
Summary Requirements for providing teleworker services are: Maintains continuity of operations Provides for increased services Secure & reliable access to information Cost effective Scalable Components needed for a teleworker to connect to an organization’s network are: Home components Corporate components
Summary Broadband services used Cable transmits signal in either direction simultaneously DSL requires minimal changes to existing telephone infrastructure delivers high bandwidth data rates to customers Wireless increases mobility wireless availability via: municipal WiFi WiMax satellite internet
Summary Securing teleworker services VPN security achieved through using Advanced encryption techniques Tunneling Characteristics of a secure VPN Data confidentiality Data integrity authentication