Download presentation
Presentation is loading. Please wait.
Published byFelicia Walton Modified over 9 years ago
1
Module 10: Providing Secure Access to Remote Offices
2
Overview Defining Private and Public Networks Securing Connections Using Routers Securing VPN Connections Between Remote Offices Identifying Security Requirements
3
Defining Private and Public Networks Seattle Public Networks Tokyo Private Networks Seattle Private Networks Tokyo Dedicated Connection Internet
4
Securing Connections Using Routers Introducing Router Security Using a Windows 2000–based Router
5
Introducing Router Security Router Seattle Router Tokyo Packet Filtering Mutual Authentication Encryption
6
Using a Windows 2000–based Router Network Address Translation IP Packet Filtering Virtual Private Network Corporate Office Remote Offices Windows 2000-based Router Windows 2000-based Router Windows 2000-based Router Internet
7
Securing VPN Connections Between Remote Offices Connecting Remote Offices over Private Networks Connecting Remote Offices over Public Networks Selecting a Tunneling Protocol Virtual Private Network Tunnel
8
Connecting Remote Offices over Private Networks HR Seattle HR Tokyo VPN Tunnel Windows 2000–based Routers
9
Connecting Remote Offices over Public Networks Tokyo Seattle ISP ISP Internet
10
Selecting a Tunneling Protocol FeaturesFeatures Tunneling Protocol L2TP/IPSec PPTPIPSecTunnel Mode Support for NAT X User Authentication XX Machine Authentication XX Multi-Protocol Support XXX Stronger Security XX Support for Non–Windows 2000– based Clients X
11
Identifying Security Requirements Step 1: Determine What Must Be Secured Step 2: Determine the Level of Security to Apply Step 3: Determine Encryption Requirements
12
Lab A: Planning Secure Connections for Remote Offices
13
Review Defining Private and Public Networks Securing Connections Using Routers Securing VPN Connections Between Remote Offices Identifying Security Requirements
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.