DOC PREVIEW
DMC ITSC 1405 - Network Access for Remote Users

This preview shows page 1-2-3-4-5-6 out of 18 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Network Access for Remote UsersReview of TechnologiesSite-to-Site Private InfrastructureTraditional Dialup ServiceVirtual Private NetworkVPN RoadmapTunnelling MethodsLayer 3 Tunnelling (GRE)Tunnelling In ActionLayer 2 Tunnelling (L2TP)Layer 2 Tunnelling ModesAuthenticationIP Security (IPSec)IPSec ProtocolsIPSec ModesEquipment at Remote SiteExample ConfigurationFragmentation GotchaNetwork Access for Remote Users Dr John S. GrahamULCCReview of Technologies• Remote Site– Private Leased Lines• Kilostream or Megastream Circuits•LES–ISDN–EPS9–ISP• Remote User– Private Dialup Service–ISPSite-to-Site Private InfrastructureTraditional Dialup ServiceHigh CostsSupport BurdenLimited to 56K Analogue DialupLimited Service☺Security GuaranteedVirtual Private Network☺Highly Flexible Solution☺Uses Existing Infrastructure Complex Security IssuesVPN RoadmapTunnellingSymmetric AsymmetricEncryptionEndpoints DataAuthentication IP FrameworkVP NTunnelling Methods• Layer III–GRE–IPSec• Layer II–L2F–PPTP–L2TPLayer 3 Tunnelling (GRE)TCPIP DataGREIPIP TCP DataGREpassenger protocolencapsulating protocolcarrier protocolTunnelling In ActionIP GRETCPIP Data IP GRE TCPIP DataDestination62.49.38.138Source192.168.17.26194.82.103.186192.168.17.26Layer 2 Tunnelling (L2TP)TCPIP DataL2TPUDPIP PPPTCPIP DataL2TPUDPIP PPPESP ESPL2TPL2TP + IPSecTCPIP DataPPPLayer 2 Tunnelling ModesCompulsory L2 TunnellingVoluntary L2 TunnellingAuthentication• Peer Identity–Shared Secret– Digital Certificate• Data Integrity– Digital Signatures• User Identity–Kerberos–RADIUSIP Security (IPSec)•Protocols– Authentication Header– Encapsulating Security Payload– Internet Key Exchange•Modes– Tunnel– TransportIPSec ProtocolsSequence NumberAuthentication DataSPINextHeaderPayloadLengthReservedSequence NumberSPIAuthentication DataDataNextHeaderPadLengthPadIVAuthentication Header (51)Encapsulating Security Protocol (50)IPSec ModesTunnel ModeIP AH/ESP TCPIP DataTransport ModeAH/ESP TCPIP DataEquipment at Remote Site• ‘Wires Only’ ADSL Connection– One Static IP Address• Splitter• Cisco 827H Router– Ethernet hub (4 ports) plus ATM portExample ConfigurationFragmentation Gotcha1540108Security Encapsulation150068Tunnel Encapsulation1500Initial PacketIP DataGREIPIP DataIPGREIP DataIPGREIP DataESP ESPIP DataGREIP ESP


View Full Document

DMC ITSC 1405 - Network Access for Remote Users

Documents in this Course
Firewall

Firewall

53 pages

Syllabus

Syllabus

11 pages

Load more
Download Network Access for Remote Users
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Network Access for Remote Users and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Network Access for Remote Users 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?