Cooperative Education – Networking Fall 2009 Network Team Saigon Institute of Technology.

Slides:



Advertisements
Similar presentations
DNA-A212 / DNA-A213 ADSL 2+ Modem/Router
Advertisements

Integration of PAP site 17 th July 10. Requirements of PAP SITE  Bandwidth drop  Router  RJ45 cables  Switch  Gateway  Nodes  Ups  9urack.
SUNNYSLOPE SCHOOL PROJECT BY SWG ENGINEERING Group Members CINDY CINDY STEVE STEVE GALLO GALLO York Technical College Cisco Networking ACADEMY.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Prototyping the WAN Designing and Supporting Computer Networks – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Using the Cisco SDM.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Hardware Firewall Feature © N. Ganesan, Ph.D.. Chapter Objectives Show the configuration of a hardware firewall such as Dlink DI 604 Illustrate the sharing.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
WiNG 5.3.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Virtual Private Network
Chapter 11: Dial-Up Connectivity in Remote Access Designs
NetComm Wireless VPN Functionality Feature Spotlight.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Barricade™ VPN Broadband Routers (4 and 8 port)
Sepehr Firewalls Sepehr Sadra Tehran Co. Ltd. Ali Shayan December 2008.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Exterior Gateway Protocol Border Gateway Protocol (BGP) Interior Gateway Protocol Routing Information Protocol (RIP) Enhanced Interior Gateway Protocol.
InterVLAN Routing Design and Implementation. What Routers Do Intelligent, dynamic routing protocols for packet transport Packet filtering capabilities.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Adjust and Troubleshoot Single- Area OSPF Scaling Networks.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 9: Novell NetWare
Cooperative Education – Networking Spring 2010 Network Team Saigon Institute of Technology.
1 NAT Network Address Translation Motivation for NAT To solve the insufficient problem of IP addresses IPv6 –All software and hardware need to be updated.
Network Admin Course Plan Accede Institute Of Science & Technology.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Packet Tracer Overview Session 1 Speaker Name 20PT Packet Tracer: Overview Session.
SG-VRT ppt Page 1 VPN Broadband Communication Risk-free networking connection via PLANET PLANET Technology Corp.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Configuring Network Devices Working at a Small-to-Medium Business or.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Module 8: Configuring Network Access Protection
Virtual Private Networks Warren Toomey. Available WAN Links.
EPipe 2344 Product Introduction. Protocols and Bandwidth Control Protocols TCP/IP, RIP, DHCP, TFTP, PPP, PPPoE, IPoE Bandwidth control (site-site) Multilink.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Virtuelne Privatne Mreže 1 Dr Milan Marković. VPN implementations  In the following sections we will discuss these popular VPN implementation methods,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Confidential New OnCell Features VPN & GuaranLink.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Configuring Network Devices
Chapter 1 Introduction to Networking
Instructor Materials Chapter 1: LAN Design
NETW 208 RANK The power of possibility/netw208rank.com
NETW 208 Enthusiastic Studysnaptutorial.com
Configuring Network Devices
NAT Configuration For ZyXEL ADSL Wireless Router
Chapter 10: Advanced Cisco Adaptive Security Appliance
Presentation transcript:

Cooperative Education – Networking Fall 2009 Network Team Saigon Institute of Technology

Introduction to Vyatta 1. Overview 2. Feature

1. Overview  Open-source networking solutions: enterprise-class Router/Firewall/VPN  Vyatta solutions offer Better value Better performance Better scalability Better flexibility Better ecosystem  The word "vyatta" is ancient Sanskrit and means "open“  Pronounced vee-AH-tah

2. Features 2.1. Subscription Services 2.2. Command Line 2.3. Web-Based GUI 2.4. Hardware Support 2.5. Virtualization 2.6. Interfaces 2.7. IP/Routing Protocols 2.8. IP Address Management 2.9. Encapsulations Security High Availability Logging & Monitoring Debugging

2.1. Subscription Services  Stable software  Regular updates  Regular bug fixes  All new features  All enhancements  Technical support  Web knowledge-base

2.2. Command Line  Integrated CLI  Single configuration file  Telnet  SSHv2

2.3. Web-Based GUI

2.4. Hardware Support  Standard 32-bt x86 processors and systems  e_cat.php  neral/Vyatta_Cisco_Replacement_Guide.pdf  neral/Vyatta_Hardware_Guidelines_v1.0.pdf

2.5. Virtualization

2.6. Interfaces  LAN interfaces: 10/100/1000 Ethernet NICs  WAN interfaces: T1/E1, T3/E3 cards 

2.7. IP/Routing Protocols  IP IPv4 IPv6*  Routing protocols OSPFv2 (Open Shortest Path First)- Support for the most popular interior routing protocol for large networks BGP-4 (Border Gateway Protocol) - Support for the core routing protocol of the Internet RIPv2 (Routing Information Protocol) - Easily build and connect internal networks Static routes - Simplifies basic router configurations

2.8. IP Address Management  Static/Dynamic IP Address  DHCP Server  DHCP Relay

2.9. Encapsulations  LAN encapsulations Ethernet 802.1Q VLANs  WAN encapsulations PPP (point to Point Protocol)‏ Multilink PPP Frame Relay HDLC  WAN encapsulations PPP (point to Point Protocol)‏ Multilink PPP Frame Relay HDLC

2.10. Security  Stateful inspection firewall  Network address translation (NAT)‏  Site-to-site IPsec VPN DES(56-bit), 3DES(168-bit), AES(128,256-bit) Encryption MD5 and SHA-1 Authentication RSA, Diffie Helman Key Management NAT Traversal Dead Peer Detection  RADIUS authentication  Individual user accounts and passwords

2.11. High Availability  VRRP (Virtual Router Redundancy Protocol)‏  IPSec VPN Clustering  Support for multiple power supplies  Each protocol sandboxed from others, providing fault isolation

1.12. Logging & Monitoring  Syslog  SNMPv2c - Simple Network Monitoring Protocol Manage network performance Find and solve network problems Plan for network growth.

2.13. Debugging  Tcpdump  Wireshark

Reference  Vyatta home page:   p  / / 

Slide History  Author: Nguyen Hai Son, Network Team, Saigon Institute of Technology  Created: Jan 30 th, 2008  Last modify:Oct. 30 th, 2009