Cooperative Education – Networking Spring 2010 Network Team Saigon Institute of Technology.

Slides:



Advertisements
Similar presentations
DNA-A212 / DNA-A213 ADSL 2+ Modem/Router
Advertisements

Business Solutions Network Security Solutions Gateway Security
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Routing Concepts Routing Protocols.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco SB Summit Praha, Jan Křístek Tomáš Chott.
Integration of PAP site 17 th July 10. Requirements of PAP SITE  Bandwidth drop  Router  RJ45 cables  Switch  Gateway  Nodes  Ups  9urack.
SUNNYSLOPE SCHOOL PROJECT BY SWG ENGINEERING Group Members CINDY CINDY STEVE STEVE GALLO GALLO York Technical College Cisco Networking ACADEMY.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Using the Cisco SDM.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Small Business RV320/RV325 Product Overview.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
WiNG 5.3.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Barricade™ VPN Broadband Routers (4 and 8 port)
Sepehr Firewalls Sepehr Sadra Tehran Co. Ltd. Ali Shayan December 2008.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Barracuda Load Balancer Server Availability and Scalability.
Exterior Gateway Protocol Border Gateway Protocol (BGP) Interior Gateway Protocol Routing Information Protocol (RIP) Enhanced Interior Gateway Protocol.
InterVLAN Routing Design and Implementation. What Routers Do Intelligent, dynamic routing protocols for packet transport Packet filtering capabilities.
Pemrograman Jaringan Routing -Aurelio Rahmadian-.
Chapter 9: Novell NetWare
Common Devices Used In Computer Networks
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Network Admin Course Plan Accede Institute Of Science & Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Packet Tracer Overview Session 1 Speaker Name 20PT Packet Tracer: Overview Session.
Operating Cisco IOS Software
SG-VRT ppt Page 1 VPN Broadband Communication Risk-free networking connection via PLANET PLANET Technology Corp.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
 Spring 2011  CSCI 27 Computer Networking Course Overview.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Introduction to Network Basic 1. Agenda – - Internetworking Basic – - OSI Layer – - TCP/IP Model – - IP Addressing – - Subnetting & VLSM – - The Internal.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Cooperative Education – Networking Fall 2009 Network Team Saigon Institute of Technology.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
SWICHING & ROUTING.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Packet Tracer 4.1 Overview Session 1 Speaker Name 20PT Packet Tracer 4.1: Overview Session.
1 Chapter 8: DHCP in IP Configuration Designs Designs That Include DHCP Essential DHCP Design Concepts Configuration Protection in DHCP Designs DHCP Design.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
UTM ( Unified Threat Management) Firewalls  Firewall Throughput: 150 Mbps  VPN Performance: 45 Mbps (3DES/AES)  1 x 10/100/1000 Ethernet WAN Port 
WIRELESS NETWORK SECURITY MUHAMMAD AFI AMIRUL BIN RAMLE.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Configuring Network Devices
Chapter 4: Routing Concepts
Chapter 1 Introduction to Networking
CompTIA Security+ Study Guide (SY0-401)
Instructor Materials Chapter 1: LAN Design
Network Security Solution
Top 5 Open Source Firewall Software for Linux User
UTM (Unified Threat Management) Firewalls
NETW 208 RANK The power of possibility/netw208rank.com
Planning and Troubleshooting Routing and Switching
CompTIA Security+ Study Guide (SY0-401)
NETW 208 Enthusiastic Studysnaptutorial.com
SPECIAL OFFER NetDefend UTM Firewall RRP€ 1063 SP€ 932 DFL-870
Configuring Network Devices
NAT Configuration For ZyXEL ADSL Wireless Router
AT&T Firewall Battlecard
Presentation transcript:

Cooperative Education – Networking Spring 2010 Network Team Saigon Institute of Technology

Introduction to Vyatta A.Overview B.Feature

A. Overview  Open-source networking solutions: enterprise-class Router/Firewall/VPN  Vyatta solutions offer Better value Better performance Better scalability Better flexibility Better ecosystem  The word "vyatta" is ancient Sanskrit and means "open“  Pronounced vee-AH-tah

B. Features 1. Subscription Services 2. Interactive 3. Hardware Support 4. Virtualization 5. Interfaces 6. IP/Routing Protocols 7. Performance Optimization 8. IP Address Management 9. Encapsulation 10. Security 11. High Availability 12. Logging & Monitoring 13. Debugging

1. Subscription Services  Stable software  Regular updates  Regular bug fixes  All new features  All enhancements  Technical support  Web knowledge-base

2. Interactive  Command Line – Integrated CLI – Single configuration file – Telnet – SSHv2

 Web-Based GUI

3. Hardware Support  Standard 32-bt x86 processors and systems  cat.php  ral/Vyatta_Cisco_Replacement_Guide.pdf  ral/Vyatta_Hardware_Guidelines_v1.0.pdf

4. Virtualization

5. Interfaces  LAN interfaces: 10/100/1000 Ethernet NICs  WAN interfaces: T1/E1, T3/E3 cards 

6. Advance Routing Protocols  IP IPv4 IPv6  R outing protocols OSPFv2 (Open Shortest Path First)- Support for the most popular interior routing protocol for large networks BGP-4 (Border Gateway Protocol) - Support for the core routing protocol of the Internet RIPv2 (Routing Information Protocol) - Easily build and connect internal networks Static routes - Simplifies basic router configurations VRRP

7. Performance Optimization  WAN Load Balancing  Ethernet Link Bonding  QoS  ECMP  MLPPP  Web Caching

8. IP Address Management  Static/Dynamic IP Address  DHCP Server  DHCP Relay

9. Encapsulations  LAN encapsulations Ethernet 802.1Q VLANs  WAN encapsulations PPP (point to Point Protocol)‏ Multilink PPP Frame Relay HDLC  WAN encapsulations PPP (point to Point Protocol)‏ Multilink PPP Frame Relay HDLC

10. Security  Stateful inspection firewall  Network address translation (NAT)‏  IPsec VPN  SSL-Based OpenVPN  Intrusion Prevention  URL Filtering  Individual user accounts and passwords

11. High Availability  VRRP (Virtual Router Redundancy Protocol)‏  IPSec VPN Clustering  Support for multiple power supplies  Each protocol sandboxed from others, providing fault isolation

12. Logging & Monitoring  Syslog  SNMPv2c - Simple Network Monitoring Protocol Manage network performance Find and solve network problems Plan for network growth.

13. Debugging  Tcpdump  Wireshark

Reference  Vyatta home page:    351/ 351/ 

Slide History  Author: Nguyen Hai Son, Network Team, Saigon Institute of Technology  Created: Jan 30 th, 2008  Last modify:Feb. 26 th, 2010