Module 10: Providing Secure Access to Remote Offices.

Slides:



Advertisements
Similar presentations
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Advertisements

Module 5: Configuring Access for Remote Clients and Networks.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Evaluation of an internet protocol security based virtual private network solution Thesis written by Arto Laukka at TeliaSonera Finland Oyj SupervisorProfessor.
TCP/IP Protocol Suite 1 Upon completion you will be able to: Virtual Private Networks and Network Address Translation Understand the difference between.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
TCP/IP Protocol Suite 1 Chapter 26 Upon completion you will be able to: Virtual Private Networks and Network Address Translation Understand the difference.
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Fermilab VPN Service What is a VPN ?.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
NetComm Wireless VPN Functionality Feature Spotlight.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 11: Remote Access Fundamentals
Security Infrastructure Overview - VPN Suresh Ramasamy.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Networks Warren Toomey. Available WAN Links.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Virtual Private Network and Customer Relationship Management By: Saeed Baayoun.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
The Tech that supports the Net Net Tech for CBIS.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Windows Vista Configuration MCTS : Advanced Networking.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks
Virtual Private Network Access for Remote Networks
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks,
Virtual Private Networks
Visit for more Learning Resources
Virtual Private Networks
Configuring and Troubleshooting Routing and Remote Access
Examining Network Protocols
Virtual Private Network (VPN)
PPPoE Internet Point to Point Protocol over Ethernet
Virtual Private Networks
Security Protocols in the Internet
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Virtual Private Networks and Network Address Translation
Virtual Private Networks and Network Address Translation
Presentation transcript:

Module 10: Providing Secure Access to Remote Offices

Overview Defining Private and Public Networks Securing Connections Using Routers Securing VPN Connections Between Remote Offices Identifying Security Requirements

Defining Private and Public Networks Seattle Public Networks Tokyo Private Networks Seattle Private Networks Tokyo Dedicated Connection Internet

 Securing Connections Using Routers Introducing Router Security Using a Windows 2000–based Router

Introducing Router Security Router Seattle Router Tokyo Packet Filtering Mutual Authentication Encryption

Using a Windows 2000–based Router Network Address Translation IP Packet Filtering Virtual Private Network Corporate Office Remote Offices Windows 2000-based Router Windows 2000-based Router Windows 2000-based Router Internet

 Securing VPN Connections Between Remote Offices Connecting Remote Offices over Private Networks Connecting Remote Offices over Public Networks Selecting a Tunneling Protocol Virtual Private Network Tunnel

Connecting Remote Offices over Private Networks HR Seattle HR Tokyo VPN Tunnel Windows 2000–based Routers

Connecting Remote Offices over Public Networks Tokyo Seattle ISP ISP Internet

Selecting a Tunneling Protocol FeaturesFeatures Tunneling Protocol L2TP/IPSec PPTPIPSecTunnel Mode Support for NAT X User Authentication XX Machine Authentication XX Multi-Protocol Support XXX Stronger Security XX Support for Non–Windows 2000– based Clients X

Identifying Security Requirements Step 1: Determine What Must Be Secured Step 2: Determine the Level of Security to Apply Step 3: Determine Encryption Requirements

Lab A: Planning Secure Connections for Remote Offices

Review Defining Private and Public Networks Securing Connections Using Routers Securing VPN Connections Between Remote Offices Identifying Security Requirements