Revised January 25, 2000 Diagram Icons. 2 ICON LIBRARY 2.16.00 Diagram Icons – CoSine IPSX Unit and CoSine Software Icons CoSine Equipment CoSine IPSX.

Slides:



Advertisements
Similar presentations
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Advertisements

Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
VOCATIONAL TRAINING AT BSNL DURG
DSL Access Architectures and Protocols. xDSL Architecture.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Presented by Serge Kpan LTEC Network Systems Administration 1.
IS Network and Telecommunications Risks
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Remote Networking Architectures
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
EAGLE EAGLE - Functionalities Modular Ports : WAN PortSecured Port Twisted PairTwiited PairFX Multi Mode FX Single Mode FX Long Haul 1 RS232 Serial Port.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
It’s About Time. Providing Integrated Services Over Copper & Cable February, 2001.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Communication Services Communication Services: –Problem: This chapter expands on topics introduced in earlier chapters related to long-distance communication.
Module 4: Designing Routing and Switching Requirements.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Wide Area Network Chapter 15 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Describe different methods for connecting.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Module 10: Providing Secure Access to Remote Offices.
VPN’s & Remote Access Issues David Trepp VP of Technology
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Networking Components
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Building Corporate Data Networks – A Case Study
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Chapter 12: Secure Communications and Network Attacks.
Win Phillips, Ph.D Win Phillips, Ph.D. Clinical Assistant Professor University of Missouri Columbia, MO.
Networking Revision. Advantages:  Communication (remotely)  Sharing hardware (saves on cost, eg. Printers)  Sharing of data and info (eg. Databases.
Mainframe 개방형 시스템 ( 좌측 부터 Sequent NUMA-Q 2000, S5000 SE80, S2000 S/290) EMC 대용량 디스크 스토리지 제품명 : Symmetrix IBM NT 서버 HP 9000 T600 G/W S/H CISCO 2501 AH2400.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
Unit Communication Hardware
Instructor Materials Chapter 1: WAN Concepts
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Planning and Troubleshooting Routing and Switching
Module 2: Configure Network Intrusion Detection and Prevention
Chapter 1: WAN Concepts Connecting Networks
Virtual Private Network (VPN)
PPPoE Internet Point to Point Protocol over Ethernet
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
Network Hardware and Protocols
Presentation transcript:

Revised January 25, 2000 Diagram Icons

2 ICON LIBRARY Diagram Icons – CoSine IPSX Unit and CoSine Software Icons CoSine Equipment CoSine IPSX Virtual Router Inside unit Power Supply Virtual Router CoSine InVision Virtual Router Icon CoSine InGage BladeMPLS Edge Node

3 ICON LIBRARY Diagram Icons – Software Icons Software Icons Authentication Server Bandwidth Manager IPSecFirewallIntrusion Detection Key Management Network Address Translation Packet Filter Service Tunnel Termination No Truck RollsVirtual Layer 2 Switch Accounting Manager SLA Manager Virtual Label Swapping Router (MPLS) Certificate Authority Device Manager Fault Manager IP Manager Performance Manager Security Manager System Manager Virtual Label Edge Router Virtual Label Switching Router PPTP Virus Detection No Forklift SNMP Virtual Interface

4 ICON LIBRARY Diagram Icons – Customer Premises and Central Office Equipment Fax Modem Phone Hub Printer Server CPU Subscriber PBX User/ Workstation LaptopMonitor CPE RouterxDSL Modem Private Frame Relay Switch Class 5 Switch Frame Relay/TDM Switch Generic Switch Big IP Router DSLAMRAS Central Office Equipment Customer Premises Equipment SSG

5 ICON LIBRARY Diagram Icons – Network Connections and Locations LANsCorporate LANsCloudBackboneSONET Ring Internet Services Processing Access Concentration Internet Edge Tunnels WWW Content Server

6 ICON LIBRARY Diagram Icons – Miscellaneous Subscriber.75 pt. Dark Blue Rules and scenario outlines 10 pt. Callouts in Dark Blue Bold Arial Narrow Font 15/16 pt. Scenario titles in Dark Blue Bold Arial Narrow Font Buildings Midplane MenuCity or LocaleShows multiple scenarios

7 ICON LIBRARY Timeline example Service Profile Subscriber Locale Subscriber Order Service ManTruck RollsScreen ShotsSubscriber Order User viewing CoSine InVision (add icons to screen as needed) Diagram Icons – Miscellaneous RADIUS Server Fabric

8 ICON LIBRARY Scenarios Laptop Modem Router Subscriber Office Dial-up Telecommuter DSL MODEM DSL User Remote Office Web Application Service Provider Subscribers Router Server User CoSine InGage

9 ICON LIBRARY Scenarios Service Provider IP Backbone CoSine IPSX 9000 Virtual Router Firewall IPSec Tunnel Termination Bandwidth Management Public Frame Relay and Private Line Services CoSine InVision