Providing Teleworker Services

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Broadband Solutions Connecting Networks.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Prototyping the WAN Designing and Supporting Computer Networks – Chapter 8.
Remote Desktop Connection Techniques Wireless Communication Networks.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 2: Teleworker Connectivity.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networking Karlene R. Samuels COSC513.
D-1 Management Information Systems for the Information Age Second Canadian Edition Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved.
CCNA 5.0 Planning Guide Chapter 7: Securing Site-to-Site Connectivity
Communications and Networks
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 6: Broadband Solutions.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
T F 1. Cable Internet requires a satellite dish.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Broadband Solutions Connecting Networks.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Communications and Networks Chapter 9. CE06_PP09-2 Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution, and communication systems.
Extended Learning Module D
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Communications and Networks
Chapter 8: Implementing Virtual Private Networks
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Virtual Private Networks Manraj Sekhon. What is a VPN?
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
IS3220 Information Technology Infrastructure Security
Virtual Private Networks (VPN) By Donald Brown. What is a VPN? A network that uses the internet, to provide remote offices or individual users with a.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Wireless Wide Area Network. Cell Phones A necessity in today’s society Advanced Radios Full Duplex Communication.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Chapter 1: Explore the Network
Instructor Materials Chapter 1: Explore the Network
Providing Teleworker Services
Networking in the Enterprise
Networking in the Enterprise
Providing Teleworker Services
Network Infrastructure
Planning & System Installation
Chapter 1: Explore the Network
Providing Teleworker Services
Virtual Private Networks (VPN)
Planning & System Installation
Chapter 1: WAN Concepts Connecting Networks
Virtual Private Network
Providing Teleworker Services
Providing Teleworker Services
Vpn’s Virtual private network is a private network that extends across a public network or internet which enables people to send and receive data across.
Providing Teleworker Services
Presentation transcript:

Providing Teleworker Services Accessing the WAN – Chapter 6

Objectives Describe the enterprise requirements for providing teleworker services Explain how broadband services extend Enterprise Networks including DSL, cable, and wireless Describe how VPN technology provides secure teleworker services in an Enterprise setting

Describe the Enterprise Requirements for Providing Teleworker Services Describe the benefits of teleworkers for business, society and the environment.

Describe the Enterprise Requirements for Providing Teleworker Services List remote connection technologies and describe scenarios in which each would be implemented.

Describe the Enterprise Requirements for Providing Teleworker Services Describe the key differences between private and public network infrastructures

Explain How Broadband Services extend Enterprise Networks Briefly describe how broadband services allow teleworkers to use the Internet to connect to the Enterprise WAN

Explain How Broadband Services extend Enterprise Networks Describe how Enterprises use cable connectivity to extend their reach

Explain How Broadband Services extend Enterprise Networks Describe how Enterprises use DSL connectivity to extend their reach

Explain How Broadband Services extend Enterprise Networks Describe how Enterprises use broadband wireless connectivity to extend their reach

Explain How Broadband Services extend Enterprise Networks Describe how Enterprises defend themselves from threats to wireless network security

Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting Explain the importance and benefits of VPN technology

Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting Compare site-to-site VPNs to remote-access VPNs

Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting Describe the hardware and software components that typically make up a VPN

Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting Describe the characteristics of secure VPNs

Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting Describe the concept of VPN tunneling

Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting Describe the concept of VPN encryption

Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting Describe the concept of IPsec Protocols

Summary Requirements for providing teleworker services are: Maintains continuity of operations Provides for increased services Secure & reliable access to information Cost effective Scalable Components needed for a teleworker to connect to an organization’s network are: Home components Corporate components

Summary Broadband services used Cable transmits signal in either direction simultaneously DSL requires minimal changes to existing telephone infrastructure delivers high bandwidth data rates to customers Wireless increases mobility wireless availability via: municipal WiFi WiMax satellite internet

Summary Securing teleworker services VPN security achieved through using Advanced encryption techniques Tunneling Characteristics of a secure VPN Data confidentiality Data integrity authentication