Module 10: Providing Secure Access to Remote Offices
Overview Defining Private and Public Networks Securing Connections Using Routers Securing VPN Connections Between Remote Offices Identifying Security Requirements
Defining Private and Public Networks Seattle Public Networks Tokyo Private Networks Seattle Private Networks Tokyo Dedicated Connection Internet
Securing Connections Using Routers Introducing Router Security Using a Windows 2000–based Router
Introducing Router Security Router Seattle Router Tokyo Packet Filtering Mutual Authentication Encryption
Using a Windows 2000–based Router Network Address Translation IP Packet Filtering Virtual Private Network Corporate Office Remote Offices Windows 2000-based Router Windows 2000-based Router Windows 2000-based Router Internet
Securing VPN Connections Between Remote Offices Connecting Remote Offices over Private Networks Connecting Remote Offices over Public Networks Selecting a Tunneling Protocol Virtual Private Network Tunnel
Connecting Remote Offices over Private Networks HR Seattle HR Tokyo VPN Tunnel Windows 2000–based Routers
Connecting Remote Offices over Public Networks Tokyo Seattle ISP ISP Internet
Selecting a Tunneling Protocol FeaturesFeatures Tunneling Protocol L2TP/IPSec PPTPIPSecTunnel Mode Support for NAT X User Authentication XX Machine Authentication XX Multi-Protocol Support XXX Stronger Security XX Support for Non–Windows 2000– based Clients X
Identifying Security Requirements Step 1: Determine What Must Be Secured Step 2: Determine the Level of Security to Apply Step 3: Determine Encryption Requirements
Lab A: Planning Secure Connections for Remote Offices
Review Defining Private and Public Networks Securing Connections Using Routers Securing VPN Connections Between Remote Offices Identifying Security Requirements