Office of Infrastructure Services Division of Communications Brad Watkins Director of Communications.

Slides:



Advertisements
Similar presentations
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Advertisements

The VPN-Alyzer When Collecting SNMP and Netflow isnt practical.
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
MX25: Multifunction SIP Gateway Zultys Technologies.
Broadband and Wide Area Network Services Carrier Gigabit Ethernet Multi Protocol Label Switching Vs. IP VPNs T-1 & T-3 SIP Trunks Security Network Topology.
ONE PLANET ONE NETWORK A MILLION POSSIBILITIES Barry Joseph Director, Offer and Product Management.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Human Computer Interaction - Fall 2010 Class project By Khang Nguyen Virtual Private Network Design for Remote Access Cambridge - SFO Airport.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
1 Configuring Virtual Private Networks for Remote Clients and Networks.
VPNs Virtual Private Networks. VPNs: Purpose Emulate a private network using shared Service Provider infrastructure Same policies as private network What.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 1 Remote Network Connectivity Requirements.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
INTERNET CONNECTIVITY Joe Muscarella Pentastar Communications.
Virtual Private Networks Globalizing LANs Timothy Hohman.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networking Karlene R. Samuels COSC513.
VIRTUAL PRIVATE NETWORKS (VPN)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Microsoft Azure Virtual Networks. Networking Compute Storage Virtual Machine Operating System Applications Data & Access Runtime Provision.
Virtual Private Network
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Secure remote access to applications through any web browser Internet Headquarters SSL Customers Suppliers Partners Mobile Workforce Applications .
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
From circuit to packet switching
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
GTA/BellSouth MPLS Agency Informational and Kick-Off Meeting
Networks for e-Gov Projects Shatrunjay Rawat IIIT, Hyderabad.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Copyright  StarVox, Inc, - All Rights Reserved- Services Platform Requirements for for Next Generation Networks Next Generation.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Hp education services education.hp.com 10 Virtual Private Networks Version B.00 H7076S Module 2 Slides.
CCNA 1 v3.0 Module 2 Networking Fundamentals. Objectives.
Wide Area Network Chapter 15 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Describe different methods for connecting.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
PVN Overview IP-VPN : IP over Virtual Private Network IP-VPN over Frame Relay IP-VPN over ATM MPLS IP-VPN over Gigabit Network IP-VPN over TDM.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
Providing Teleworker Services
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
Applications over the WAN Growth is in ‘Voice over the WAN’ (doubling over the next year) Mature applications expected to remain stable Some growth in.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Revised January 25, 2000 Diagram Icons. 2 ICON LIBRARY Diagram Icons – CoSine IPSX Unit and CoSine Software Icons CoSine Equipment CoSine IPSX.
VIRTUAL PRIVATE NETWORKS (VPN) By s k satapathy s k satapathy clicktechsolution.com.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Lecture 1: Introduction to WAN
Building Corporate Data Networks – A Case Study
(c) David Strom Inc VPNs and Telecommuters David Strom Connected Home 5/02.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Network (VPN)
Virtual Private Network (VPN)
Presentation transcript:

Office of Infrastructure Services Division of Communications Brad Watkins Director of Communications

Technical Overview KIH-1 KIH-2 Category B Services KIH-2 Category A Services

KIH-2 Conversion Timeline JANFEBMARAPRMAYJUNJULAUGSEPOCTNOVDEC KIH-2 (B) New Provisioning KIH-2 (A) New Provisioning KIH to KIH-2 (B) E-Rate KIH-2 (A) Conversion will begin in 2006 KIH Conversion to KIH-2 (B) State Wide

INTERNET Network VPN MPLS Network Network Based Internet Access Service Firewall & IPSec Gateway Business Partner Site Telecommuter/Mobile User (IPSec software) Telecommuter Branch Site Small Site Medium Site Headquarters Site Dial, DSL, ISDN Or Cable Site-to-Site Frame Relay Site-to-Site Private Line Site-to-Site Frame Relay Or Private Line Extension Site-to-Site Private IP DSL DSL “Off-Net” Sites“On-Net” Sites KIH-2 Category A