Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Module 5: Configuring Access for Remote Clients and Networks.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 11 Windows Server 2008 Virtualization.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Wi-Fi Structures.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Network+ Guide to Networks, Fourth Edition Chapter 7 WANs, Internet Access, and Remote Connectivity.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
Terminal Services Terminal Services is the modern equivalent of mainframe computing, in which servers perform most of the processing and clients are relatively.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
NETWORKING HARDWARE.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Networking Components Chad Benedict – LTEC
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Windows Server 2008 Chapter 9 Last Update
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
Network+ Guide to Networks, Fourth Edition Chapter 7 WANs, Internet Access, and Remote Connectivity.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Chapter 5 Networks Communicating and Sharing Resources
Chapter 7 WANs, Internet Access, and Remote Connectivity Network+ Guide to Networks, Fourth Edition.
Chapter 7: Using Windows Servers to Share Information.
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
1 WHY NEED NETWORKING? - Access to remote information - Person-to-person communication - Cooperative work online - Resource sharing.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Common Devices Used In Computer Networks
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Network Plus Virtualization Concepts. Virtualization Overview Virtualization is the emulation of a computer environment called a Virtual Machine. A Hypervisor.
Today’s Topics Chapter 8: Networks Chapter 8: Networks HTML Introduction HTML Introduction.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Hands-On Virtual Computing
CEG 2400 FALL 2012 Chapter 10 Virtual Networks and Remote Access 1.
Chapter Eight Internetworking with Remote Access.
Windows Vista Configuration MCTS : Advanced Networking.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Using Virtualization in the Classroom
Chapter 7: Using Windows Servers
Guide to Operating Systems, 5th Edition
Chapter 6: Securing the Cloud
Network+ Guide to Networks 7th Edition
Network+ Guide to Networks 6th Edition
An Introduction to Computer Networking
Guide to Operating Systems, 5th Edition
Presentation transcript:

Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access

Objectives Explain virtualization and identify characteristics of virtual network components Create and configure virtual servers, adapters, and switches as part of a network Describe techniques for incorporating virtual components in VLANs Explain methods for remotely connecting to a network, including dial-up networking, virtual desktops, and thin clients Network+ Guide to Networks, 6 th Edition2

Objectives (cont’d.) Discuss VPNs (virtual private networks) and the protocols they rely on Identify the features and benefits of cloud computing and NaaS (Network as a Service) Network+ Guide to Networks, 6 th Edition3

Virtualization Emulation of a computer, operating system environment, or application: –On a physical system Virtual machines (VMs) –Virtual workstations –Virtual servers –Can be configured to use different types of: CPU Storage drive NIC Network+ Guide to Networks, 6 th Edition4

Virtualization (cont’d.) VM appears to user no different than physical computer: –Running the same software Host –Physical computer Guest –Virtual machines Hypervisor –Manages virtual machines Network+ Guide to Networks, 6 th Edition5

6 Figure 10-1 Elements of virtualization Courtesy Course Technology/Cengage Learning

Virtualization (cont’d.) Advantages of virtualization –Efficient use of resources –Cost and energy savings –Fault and threat isolation –Simple backups, recovery, and replication Disadvantages –Compromised performance –Increased complexity –Increased licensing costs –Single point of failure Network+ Guide to Networks, 6 th Edition7

Virtual Network Components Virtual network –Can be created to consist solely of virtual machines on a physical server Most networks combine physical and virtual elements Network+ Guide to Networks, 6 th Edition8

Virtual Machines and Adapters Virtualization program –Assigns VM’s software and hardware characteristics –Often easy to use, step-by-step wizard Operating system images –Available for download online Or on disc from software vendors Network connection –Requires virtual adapter (vNIC) Network+ Guide to Networks, 6th Edition9

10 Figure 10-2 Specifying a VM’s memory in VMware Courtesy Course Technology/Cengage Learning

Network+ Guide to Networks, 6 th Edition11 Figure 10-3 Customizing vNIC properties in VMware Courtesy Course Technology/Cengage Learning

Virtual Switches and Bridges Virtual bridge or switch –Created when first VM’s NIC is selected –Connects VM with host –Resides in RAM Virtual switch –Logically defined device –Operates at Data Link layer –Passes frames between nodes Virtual bridge –Connects vNICs with a network Network+ Guide to Networks, 6th Edition12

Network+ Guide to Networks, 6 th Edition13 Figure 10-4 Virtual servers on a single host connected with a virtual switch Courtesy Course Technology/Cengage Learning

Network+ Guide to Networks, 6 th Edition14 Figure 10-5 Virtual switches exchanging traffic through routers Courtesy Course Technology/Cengage Learning

Network Connection Types Must identify networking mode vNIC will use Frequently-used network connection types –Bridged –NAT –Host-only Bridged –vNIC accesses physical network using host machine’s NIC –Obtains own IP address, default gateway, and netmask from DHCP server on physical LAN Network+ Guide to Networks, 6 th Edition15

Network+ Guide to Networks, 6 th Edition16 Figure 10-6 vNIC accessing a network in bridged mode Courtesy Course Technology/Cengage Learning

Network+ Guide to Networks, 6 th Edition17 Figure 10-7 Selecting the Bridged option for a vNIC in VMware Courtesy Course Technology/Cengage Learning

Network Connection Types (cont’d.) NAT –vNIC relies on host to act as NAT device –Obtains IP addressing information from host –Virtualization software acts as a DHCP server –Default network connection type in VMware, VirtualBox, and KVM Host-only –VMs on one host can exchange data with each other and the host –Cannot communicate with nodes beyond the host –Never receive or transmit data with host’s physical NIC Network+ Guide to Networks, 6 th Edition18

Network+ Guide to Networks, 6 th Edition19 Figure 10-8 vNIC accessing a network in NAT mode Courtesy Course Technology/Cengage Learning

Network+ Guide to Networks, 6 th Edition20 Figure 10-9 Selecting the NAT option for a vNIC in VirtualBox Courtesy Course Technology/Cengage Learning

Network+ Guide to Networks, 6 th Edition21 Figure Host-only network configuration Courtesy Course Technology/Cengage Learning

Virtual Appliances Alternative to test servers for new software Virtual appliance includes: –Image of operating system, software, hardware specifications, and application configuration Most commonly virtual servers Popular functions –Firewall – solutions –Network management –Remote access Network+ Guide to Networks, 6 th Edition22

Virtual Networks and VLANs Virtual network –Refers to how VMs connect with other virtual and physical network nodes Virtual network management –Nearly identical to physical network management To add VMs to a physical VLAN: –Modify virtual switch’s configuration Steps vary for different virtualization programs Network+ Guide to Networks, 6 th Edition23

Network+ Guide to Networks, 6 th Edition24 Figure Multiple virtual servers connected to multiple VLANs Courtesy Course Technology/Cengage Learning

Remote Access and Virtual Computing Remote access –Allows user to connect with LAN or WAN in different geographical location –Allows access to shared resources as any other client on LAN or WAN –Requires transmission path and appropriate software Popular remote access techniques –Dial-up networking –Microsoft’s Remote Access Service (RAS) Or Routing and Remote Access Service (RRAS) –Virtual Private Networks Network+ Guide to Networks, 6 th Edition25

Dial-Up Networking Dialing directly into private network’s or ISP’s remote access server Usually refers to connection using PSTN Remote access server attached to group of modems Client must run dial-up software After authentication, user allowed access Remote access server can serve multiple users Low throughput Less popular today Network+ Guide to Networks, 6 th Edition26

Remote Access Servers Accepts connections regardless of Internet connection type RRAS (Routing and Remote Access Service) –Microsoft’s remote access software –Available with Server 2003, 2008, 2008 R2, XP, Vista, and 7 operating systems –Enables server to act as a router –Includes multiple security provisions Network+ Guide to Networks, 6 th Edition27

Network+ Guide to Networks, 6 th Edition28 Figure Clients connecting with a remote access server Courtesy Course Technology/Cengage Learning

Remote Access Protocols SLIP (Serial Line Internet Protocol) –Earlier and less sophisticated than PPP –Can only carry IP packets –Requires significant amount of setup –Does not support data encryption –Asynchronous transmission PPP (Point-to-Point Protocol) –Known as PPPoE when used over Ethernet –Standard for connecting home computers to ISP Via DSL or broadband cable Network+ Guide to Networks, 6 th Edition29

Remote Virtual Computing Allows workstation to remotely access and control another workstation Host may allow clients a variety of privileges Can send keystrokes and mouse clicks to the host –Receive screen output in return Thin client –Workstation that uses such software to access LAN –Requires very little hard disk space or processing power Network+ Guide to Networks, 6 th Edition30

Network+ Guide to Networks, 6 th Edition31 Figure Protocols used in a remote access Internet connection Courtesy Course Technology/Cengage Learning

Remote Virtual Computing (cont’d.) Advantages –Simple to configure –Runs over any connection type –Single host can accept simultaneous connections from multiple clients Popular programs –Microsoft Remote Desktop –VNC (Virtual Network Computing) –ICA (Independent Computing Architecture) Network+ Guide to Networks, 6 th Edition32

VPNs (Virtual Private Networks) Logically defined networks over public transmission systems –Isolated from other traffic on same public lines Requires inexpensive software Important considerations –Interoperability –Security Types –Site-to-site –Client-to-site Network+ Guide to Networks, 6 th Edition33

Network+ Guide to Networks, 6 th Edition34 Figure Site-to-site VPN Courtesy Course Technology/Cengage Learning

Network+ Guide to Networks, 6 th Edition35 Figure Client-to-site VPN Courtesy Course Technology/Cengage Learning

VPNs (cont’d.) Enterprise-wide VPN –Can include elements of client-to-site and site-to-site models VPNs tailored to customer’s distance, user, and bandwidth needs Two major types of tunneling protocols –PPTP (Point-to-Point Tunneling Protocol) –L2TP (Layer 2 Tunneling Protocol) Network+ Guide to Networks, 6 th Edition36

Cloud Computing Internet frequently pictured as a cloud Cloud computing –Flexible provision of data storage, applications, and services To multiple clients over a network Cloud computing distinguishing features –Self-service and on-demand –Elastic –Supports multiple platforms –Resource pooling and consolidation –Metered service Network+ Guide to Networks, 6 th Edition37

Network+ Guide to Networks, 6 th Edition38 Figure Example of cloud computing Courtesy Course Technology/Cengage Learning

Cloud Computing (cont’d.) Can provide virtual desktops –Operating environments hosted virtually –Different physical computer than one user interacts with NaaS (Network as a Service) –Service provider offers customers complete set of networking services Types of delivery –Public cloud –Private cloud Network+ Guide to Networks, 6 th Edition39

Summary Virtualization: emulation of a computer, operating system environment, or application on a physical system VMs exist as files on physical computer’s hard disk Hypervisor software manages resource allocation and sharing among virtual machines Virtual switch allows VMs to communicate with each other and with nodes on a physical LAN or WAN Different methods of remote user access exist Cloud computing provides storage, applications, or services over a network Network+ Guide to Networks, 6 th Edition40