190 likes | 385 Views
Providing Teleworker Services. Accessing the WAN – Chapter 6 Sandra Coleman, CCNA, CCAI. Objectives. Describe the enterprise requirements for providing teleworker services Explain how broadband services extend Enterprise Networks including DSL, cable, and wireless
E N D
Providing Teleworker Services Accessing the WAN– Chapter 6 Sandra Coleman, CCNA, CCAI
Objectives • Describe the enterprise requirements for providing teleworker services • Explain how broadband services extend Enterprise Networks including DSL, cable, and wireless • Describe how VPN technology provides secure teleworker services in an Enterprise setting
Enterprise Requirements for Providing Teleworker(telecommuter) Services • Describe the benefits of teleworkers for business, society and the environment.
Enterprise Requirements for Providing Teleworker Services • Traditional private WAN – Frame Relay, ATM, leased lines. Provide remote access solutions. • IPsec VPNs – offer flexible and scalable connectivity • Site-to-site connections – Most common – broadband, Secure VPN over public internet
Enterprise Requirements for Providing Teleworker Services • At home: Computer, broadband access (DSL, etc), VPN router • At the office: VPN-capable routers, security appliances, authentication and mgt devices.
How Broadband Services extend Enterprise Networks • Dialup – inexpensive,56K speeds • DSL – more expensive, faster connection< >=200K • Cable modem – similar to DSL, shared service, so speed is affected by # users • Satellite – Satellite modem, radio signals, <128K < 512K
How Broadband Services extend Enterprise Networks • Headend – where signals are first received, processed and distributed downstream. • Distribution network – Tree & branch system of cabling. • Subscriber drop – connection of subscriber to the service.
How Broadband Services extend Enterprise Networks • DSL-high speed connection over copper wires. Not all bandwidth of phone wires was being used, so ADSL took up the slack. • Local loop (last mile) – NOT as shared medium, therefore each user has a direct connection to the DSLAM (DSL Access Multiplexer).
How Broadband Services extend Enterprise Networks • Provides mobility – • Municipal – gov’t working with ISP to deploy Wi-Fi • WiMAX – (Worldwide Interoperability for Microwave Access) higher speeds, greater distances. Aimed at providing coverage to rural areas out of reach by DSL • Satellite – available worldwide. Approx 500kbps. Types of wireless
Security for Broadband Services extend Enterprise Networks • 802.11b – 11 Mbps • 802.11g – 54 Mbps • 802.11n - > 54 Mbps • 802.16 – WiMAX 70 Mbps, with a range of 30 miles.
VPN Technology • What is a VPN? virtual WAN infrastructure that connects business partner sites to a corporate network. • Virtual – Private network over a public network • Private – data is encrypted • Each LAN is an IsLANd– Each inhabitant of the island gets their own submarine to connect to the mainland which is fast, at your disposal, can be invisible, and is very dependable.
VPN Technology • Cost savings – No more dedicated lines! • Security – Advanced encryption and authentication protocols • Scalability – Easy to add new users without adding significant infrastructure changes.
Types of VPN’s • Site-to-Site – access between 2 physical sites. • Remote-access – gives remote users acces to the corporate network over a shared infrastructure. Used by teleworkers and mobile users.
VPN Components • An existing network (clients/servers) • Connection to the internet • VPN gateways, such as routers, firewalls, etc, that act as endpoints to establish, maintain, and manage VPN connections • Appropriate software to create and manage VPN tunnels
Characteristics of secure VPNs • Data confidentiality – protect data from eavesdroppers! VPNs do this using mechanisms of encapsulation and encryption • Data Integrity – guarantees that no tampering or alterations to the data occur while it travels from source to destination. Typicallly done using a hash feature. • Authentication – ensures that a message comes from an authenticated source and goes to an authenticated destination. Uses passwords, digital certificates, smart cards, and even biometrics!
VPN Tunneling • Tunneling allows the use of public networks to carry data for users as though the users had access to a private network. See the figure on pg. 410 for an example
VPN Encryption • Encryption – the act of coding a given message into a different format to alter the data’s appearance, making it incomprehensible tot hose who are not authorized to view it. • Uses an algorithm (DES, 3DES, AES, RSA) • Three basic components – • Key • Cipher • Message • Hashes – MD5, SHA-1
Ipsec security protocols • IPsec - a protocol suite for securing IP communications that provides encryption, integrity, and authentication. • 2 main framework protocols • Authentication Header (AH) – used when confidentiality is not required. No encryption. Usually used with ESP • Encapsulation Security Payload (ESP) – provides confidentiality and authentication
What to do now? • Online Test – On until Wednesday, April 3, midnight! • Test grade for Ch. 6 will be the Packet Tracer Skills Integration Challenge on pg. 219. (LSG04-PTSkills6.pka) • You will do this NOW!