YOUR LOGO Networking I. YOUR LOGO Obsah prednášky  Network Access,  Remote Access Server,  VPN, dial-up,  Network Access Protection – NAP, 802.3,

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Integration of PAP site 17 th July 10. Requirements of PAP SITE  Bandwidth drop  Router  RJ45 cables  Switch  Gateway  Nodes  Ups  9urack.
Networking Essentials Chapter 10 Fall, IGPs are used… EGPs are used…
4.1 Configuring Network Access Components of a Network Access Services Infrastructure What is the Network Policy and Access Services Role? What is Routing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
NetComm Wireless VPN Functionality Feature Spotlight.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
4 September 2015 RE Meyers, Ms.Ed., CCAI CCENT ICND1 Exam Topics Review Describe the Operation of Data Networks: Network Diagrams and Data Paths.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
Jan 29, 2008CS573: Network Protocols and Standards1 NAT, DHCP Autonomous System Network Protocols and Standards Winter
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
1 Network Security Revisited ITEC 370 George Vaughan Franklin University.
Module 6: Configuring and Troubleshooting Routing and Remote Access
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
Network Admin Course Plan Accede Institute Of Science & Technology.
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 4: Designing Routing and Switching Requirements.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Module 11: Remote Access Fundamentals
Module 7 Planning Server and Network Security. Module Overview Overview of Defense-in-Depth Planning for Windows Firewall with Advanced Security Planning.
Interior Gateway Protocol. Introduction An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Configuring Network Access Protection
Introduction & Vision. Introduction MANTICORE provides a software implementation and tools for providing and managing routers and IP networks as services.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Routing with Windows Server 2003 Chapter 9. Objectives for this Chapter Manage Routing And Remote Access routing interfaces Manage packet filters Manage.
1 Interview Questions - What is the difference between TCP and UDP? - What is Nagle's Algorithm? - Describe the TCP handshaking process. - What is Slow.
Module 6: Network Policies and Access Protection.
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 2 Single-Area OSPF.
Module 5: Network Policies and Access Protection
Kittiphan Techakittiroj (25/06/59 19:10 น. 25/06/59 19:10 น. 25/06/59 19:10 น.) Network Address Translation Kittiphan Techakittiroj
Siti Kholijah Binti Hashim TSI/2013. FREQUENCY 2.452GHz GHz SECURITY WEP, WPA, WPA2 STANDARD IEEE802.16e-2005 Wave 2 (WiMAX) TRANSMIT POWER.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
FIREWALL configuration in linux
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Remote Access Lecture 2.
Implementing Network Access Protection
Implementing TMG Server Publishing
Interconnecting Cisco Networking Devices Part question-answers.blogspot.com/
Working at a Small-to-Medium Business or ISP – Chapter 6
Get Free Verified Cisco Study Material - Cisco Exam Dumps Realexamdumps.com
CHAPTER 10.
Server-to-Client Remote Access and DirectAccess
Chapter 25 Digital Evidence at the Network and Transport Layers
After 3.2 Revised
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Windows Firewall Adem Enes POLAT
Internet protocol stack
Presentation transcript:

YOUR LOGO Networking I

YOUR LOGO Obsah prednášky  Network Access,  Remote Access Server,  VPN, dial-up,  Network Access Protection – NAP, 802.3, NAT, Configuring NAP,  Configuring wireless Authentication.

YOUR LOGO RRAS in Server 2008  Server manager – Network Policy and Acess Server Role, nutnosť doinštalovať rolu  Nová technológia SSTP tuneling protocol – secure socket tunelling protocol, pridal sa ku PPTP, L2TP Vytvára VPN cez standardne protokoly ako SSL tunel  NAP = network access protection – VPN Enforcement uplatnuje NAP.  IPv6 podpora

YOUR LOGO Nastavenie RRAS  Role services: -Možnosť routovania – podpora iba RIP už nie OSPF -NAT Server -RRAS -NPS – network policy server = starý IAS – RADIUS server Health reg Authority

YOUR LOGO Ako to funguje

YOUR LOGO Instalace role

YOUR LOGO

Administrace  NAP – remote access policy  RRAS – routing and remote access -Ako vo WIN 2003

YOUR LOGO NAP

YOUR LOGO Routing  Mechanizmus na spájanie podsietí s rôznymi Net ID na 3. vrstve ISO/OSI  Postup rozlišovania lokálnej / vzdialenej podsiete:  If (Source IP && Mask) == (Destination IP && Mask) then “local IP address” else “remote IP address”

YOUR LOGO Router  Zariadenie s viacerými sieťovými rozhraniami  Každé rozhranie má jednu IP adresu, všetky patria do rozličných sietí (Net ID)  Vyhotovenie v HW (Cisco) / SW (MS Server 2003, Linux,...)

YOUR LOGO Routovacia tabuľka

YOUR LOGO Typy routovania  Statické - manuálna údržba, pre malé/statické siete - spoľahlivé, bezpečné  Dynamické -“automatická“ údržba, pre rozsiahle siete - nebezpečenstvo vzniku smerovacích slučiek, neautorizovaná aktualizácia

YOUR LOGO Smerovacie protokoly  Distance vector RIPv1, RIPv2, IGRP  Link state OSPF, BGP

YOUR LOGO RIP  Jednoduchý smerovací protokol  Funguje s využitím UDP  Obmedzenie na 15 skokov  Aktualizácia každých 30 sekúnd  Komunikácia broadcastom

YOUR LOGO OSPF  Pokročilý protokol pre spájanie „pateřních“ sietí založený na TCP  Bez obmedzenia 15 skokov  Komunikácia unicastom alebo multicastom  Autentizácia  Udalosťou spúšťané aktualizácie

YOUR LOGO Poznámky  Metrika udáva kvalitu cesty  Klient musí mať nastavenú východziu bránu  Router analyzuje dáta do úrovne 3. vrstvy ISO/OSI

YOUR LOGO 18 Marek Žídek, 2006 NAT  Network Address Translation  Překlad IP adres  Hardware i Software realizace

YOUR LOGO 19 Marek Žídek, 2006 Princip NAT-u  Mapování privátní IP adresy klienta a privátního portu klienta na veřejní IP adresu NAT serveru a port NAT serveru  Vnitřní IP adresa NAT serveru slouží jako výchozí brána pro klienti v interní síti

YOUR LOGO 20 Marek Žídek, 2006 NAT  Dosažitelnost lokálních služeb z extranetu pomocí mapování lokální IP:port na veřejnou IP:port  Při překladu mění IP adresy v packetu  Klient v místní síti si myslí, že komunikuje s NAT serverem

YOUR LOGO 21 Marek Žídek, 2006 NAT – M$  Nastavuje se v konzoli Routing and Remote Access  Má zabudovaný i triviální firewall  Podporuje NAT-T

YOUR LOGO 22 Marek Žídek, 2006 NAT - sumarizace  Ochrana počítačů ve vnitřní síti  Transparentní pro většinu služeb  Omezený počet portů pro publikování služeb vnitřních klientů  Omezený IPSec