240 likes | 424 Views
Local Area Networks (LANs). Local Area Networks (LANs) Course Lessons. Lesson 1: Overview of Local Area Networks Lesson 2: Wide Area Networks (WANs) Lesson 3: Networking and the Internet Lesson 4: LAN Topologies Lesson 5: Networking Models, Traffic and Devices Lesson 6: Transmission Media
E N D
Local Area Networks (LANs) Course Lessons • Lesson 1: Overview of Local Area Networks • Lesson 2: Wide Area Networks (WANs) • Lesson 3: Networking and the Internet • Lesson 4: LAN Topologies • Lesson 5: Networking Models, Traffic and Devices • Lesson 6: Transmission Media • Lesson 7: LAN Standards, Wireless Networking and Name Resolution • Lesson 8: Network Management
1. If you want to establish a DMZ using only one firewall, how many network interface cards (NICs) does the firewall need? a. One b. Two c. Three d. Four 2. Which of the following was the first global computer network? a. ARPANET b. NSFnet c. The World Wide Web d. CompuServe 3. What are two ways in which internal LAN security can be accomplished? Lesson 3Pre-Assessment Questions
Lesson 3 Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery
Networking and the Internet Figure 3-1: Multiple connections among servers
Lesson 3 Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery
Perimeter and Core Networks Figure 3-2: Perimeter and core
Lesson 3 Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery
Firewalls Figure 3-3: Firewall
Demilitarized Zone (DMZ) Figure 3-4: DMZ using two firewalls
Lesson 3 Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery
Extranet Figure 3-5: CTP+ Partners and Instructors login page -- extranet
Lesson 3 Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery
Remote Access Server (RAS) Figure 3-6: Remote access
Virtual Private Network (VPN) Figure 3-7: VPN tunnel
Lesson 3 Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery
Fault Tolerance – RAID Figure 3-8: Redundant array of inexpensive disks (RAID) 5
RAID 1: Disk Mirroring Figure 3-9: Disk mirroring
RAID 1: Disk Mirroring (cont'd) Figure 3-10: Mirror set
Disk Duplexing Figure 3-11: Disk duplexing
RAID 5: Disk Striping with Parity Figure 3-12: RAID 5 uses at least three hard disks
RAID 5: Disk Striping with Parity (cont'd) Figure 3-13: Disk striping with parity
Disaster Recovery Planning Table 3-1: Alternate site types
Match each technology with the correct description Activity 3-1: Reviewing secure communication techniques