© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Broadband Solutions Connecting Networks.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Network Troubleshooting Accessing the WAN – Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Prototyping the WAN Designing and Supporting Computer Networks – Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 2: Teleworker Connectivity.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 2: Teleworker Connectivity.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
D-1 Management Information Systems for the Information Age Second Canadian Edition Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved.
CCNA 5.0 Planning Guide Chapter 7: Securing Site-to-Site Connectivity
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 6: Broadband Solutions.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
Chapter 7: Securing Site-to-Site Connectivity
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Routing and Switching in the Enterprise – Chapter 1 Networking.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Broadband Solutions Connecting Networks.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Basic Wireless Concepts & Configuration Chapter.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 8: Implementing Virtual Private Networks
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Providing Teleworker Services
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 LAN Design LAN Switching and Wireless – Chapter 1.
Virtual Private Network (VPN)
Network Fundamentals – Chapter 8
Virtual Private Networks Manraj Sekhon. What is a VPN?
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Physical Layer Network Fundamentals – Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Chapter 1: Explore the Network
Instructor Materials Chapter 1: Explore the Network
Providing Teleworker Services
Networking in the Enterprise
Providing Teleworker Services
Chapter 1: Explore the Network
Providing Teleworker Services
Planning & System Installation
Providing Teleworker Services
Providing Teleworker Services
Providing Teleworker Services
Presentation transcript:

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 2 Objectives  Describe the enterprise requirements for providing teleworker services  Explain how broadband services extend Enterprise Networks including DSL, cable, and wireless  Describe how VPN technology provides secure teleworker services in an Enterprise setting

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 3 Describe the Enterprise Requirements for Providing Teleworker Services  Describe the benefits of teleworkers for business, society and the environment.

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 4 Describe the Enterprise Requirements for Providing Teleworker Services  List remote connection technologies and describe scenarios in which each would be implemented.

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 5 Describe the Enterprise Requirements for Providing Teleworker Services  Describe the key differences between private and public network infrastructures

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 6 Explain How Broadband Services extend Enterprise Networks  Briefly describe how broadband services allow teleworkers to use the Internet to connect to the Enterprise WAN

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 7 Explain How Broadband Services extend Enterprise Networks  Describe how Enterprises use cable connectivity to extend their reach

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 8 Explain How Broadband Services extend Enterprise Networks  Describe how Enterprises use DSL connectivity to extend their reach

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 9 Explain How Broadband Services extend Enterprise Networks  Describe how Enterprises use broadband wireless connectivity to extend their reach

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 10 Explain How Broadband Services extend Enterprise Networks  Describe how Enterprises defend themselves from threats to wireless network security

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 11 Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting  Explain the importance and benefits of VPN technology

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 12 Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting  Compare site-to-site VPNs to remote-access VPNs

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 13 Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting  Describe the hardware and software components that typically make up a VPN

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 14 Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting  Describe the characteristics of secure VPNs

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 15 Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting  Describe the concept of VPN tunneling

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 16 Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting  Describe the concept of VPN encryption

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 17 Describe How VPN Technology Provides Secure Teleworker Services in an Enterprise Setting  Describe the concept of IPsec Protocols

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 18 Summary  Requirements for providing teleworker services are: –Maintains continuity of operations –Provides for increased services –Secure & reliable access to information –Cost effective –Scalable  Components needed for a teleworker to connect to an organization’s network are: –Home components –Corporate components

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 19 Summary  Broadband services used –Cable transmits signal in either direction simultaneously –DSL requires minimal changes to existing telephone infrastructure delivers high bandwidth data rates to customers –Wireless increases mobility wireless availability via: » municipal WiFi » WiMax » satellite internet

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 20 Summary  Securing teleworker services –VPN security achieved through using Advanced encryption techniques Tunneling –Characteristics of a secure VPN Data confidentiality Data integrity authentication

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 21