Teleworker Services
CCNA4-1
Chapter 6
CCNA4-2
Chapter 6
CCNA4-3
Chapter 6
CCNA4-4
Chapter 6
CCNA4-5
Chapter 6
VPN Components
Router needs QoS VPN Router or VPN client.
Cable, DSL
CCNA4-7
CCNA4-8
Chapter 6
Organizations use VPNs to provide a virtual WAN that connects branch or home offices, business partner sites, and remote telecommuters.
CCNA4-9
Chapter 6
Security:
Advanced encryption and authentication protocols protect data from unauthorized access.
Scalability:
Organizations, big and small, are able to add large amounts of capacity without adding significant infrastructure.
CCNA4-10
Chapter 6
Firewall or router.
CCNA4-11
Chapter 6
CCNA4-12
Chapter 6
CCNA4-13
Chapter 6
The software encapsulates and encrypts that traffic before sending it over the Internet.
On receipt, the VPN gateway handles the data in the same way as it would handle data from a site-to-site VPN.
CCNA4-14
Chapter 6
VPN Components
VPN gateway endpoints to establish, manage, and control connections.
CCNA4-15
Chapter 6
VPN Components
The key to VPN effectiveness is SECURITY
VPNs secure data by encapsulating and encrypting the data. Encapsulation is referred to as tunneling, because encapsulation transmits data transparently from network to network through a shared infrastructure--as if an individual tunnel existed between the endpoints. Encryption codes data into a different format using a key. Decryption decodes encrypted data into the original unencrypted format.
CCNA4-16
Chapter 6
CCNA4-17
Chapter 6
VPN Tunneling
Tunneling allows the use of public networks like the Internet to carry data for users as though the users had access to a private network. Tunneling encapsulates an entire packet within another packet and sends the new, composite packet over a network.
CCNA4-18
Chapter 6
VPN Tunneling
An e-mail message traveling through the Internet over a VPN.
CCNA4-19
Chapter 6
VPN Tunneling
PPP carries the message to the VPN device, where the message is encapsulated within a Generic Route Encapsulation (GRE) packet. GRE is a tunneling protocol developed by Cisco.
The outer packet source and destination addressing (Internet IP Addresses) is assigned to "tunnel interfaces" and is made routable across the network. Once a composite packet reaches the destination tunnel interface, the inside packet is extracted.
CCNA4-20
Chapter 6
CCNA4-21
Chapter 6
CCNA4-22
Chapter 6
CCNA4-23
Chapter 6
CCNA4-25
Chapter 6
CCNA4-26
Chapter 6
CCNA4-27
Chapter 6
Asymmetric Encryption
Public Key cryptography Encrypt and decrypt with a different key Typically used for digital certificates and key management
RSA
CCNA4-28
Chapter 6
CCNA4-29
Chapter 6
2.RSA signature: Uses the exchange of digital certificates to authenticate the peers.
CCNA4-31
Chapter 6
CCNA4-32
Chapter 6
CCNA4-33
Chapter 6
Diffe-Hellman: Allows two parties to establish a shared secret key used by encryption and hash algorithms over an unsecure line.
CCNA4-34
Chapter 6
Which Encryption?
Which hash method?
CCNA4-35
Chapter 6
CCNA4-36
Chapter 6
Broadband - advanced communications systems capable of providing highspeed transmission of services over the Internet and other networks. Transmission speeds typically exceed 200,000 bits per second in at least one direction:
CCNA4-37
Chapter 6
Dialup Access
Inexpensive using existing telephone lines. The slowest option, it is typically used by mobile workers in areas where high speed connections are not available.
CCNA4-38
Chapter 6
DSL Access
DSL also uses telephone lines. A DSL modem separates the DSL signal from the telephone signal. Provides an Ethernet connection to a host computer or LAN.
CCNA4-39
Chapter 6
CCNA4-40
Chapter 6
CCNA4-41
Chapter 6
Voice
CCNA4-43
Chapter 6
Subscriber connection.
Chapter 6
Signals are transmitted simultaneously in either direction. Divided into two paths: Downstream: Headend to Subscriber (810 MHz). Upstream: Subscriber to Headend (37 MHz).
CCNA4-45 Chapter 6
CCNA4-46
Chapter 6
DOCSIS 3.0
160
120
CCNA4-47
Chapter 6
Broadband Wireless
Wireless networking, or Wi-Fi, has improved the connectivity situation, not only in the SOHO, but also on enterprise campuses. Using 802.11 networking standards, data travels using the unlicensed radio spectrum. Most radio and TV transmissions are government regulated and require a license to use.
CCNA4-48
Chapter 6
Broadband Wireless
Until recently, a significant limitation of wireless access has been the need to be within the local transmission range (typically less than 100 feet) of a wireless router or wireless access point that has a wired connection to the Internet. Once a worker left the office or home, wireless access was not readily available.
New developments in broadband wireless technology are increasing wireless availability. Municipal Wi-Fi WiMAX Satellite Internet
CCNA4-49
Chapter 6
CCNA4-50
Chapter 6
CCNA4-51
Chapter 6
CCNA4-53
Chapter 6
CCNA4-54
Chapter 6
Two-way satellite Internet uses IP multicasting technology. Allows one satellite to serve up to 5,000 channels.
CCNA4-55 Chapter 6