transcript
- Slide 1
- Slide 2
- Natalie De Koker, Lindsay Haley, Jordan Lunda, Matty Ott
- Slide 3
- Virtual Private Networks
- Slide 4
- PPTP VPNs Point-to-Point Tunneling Protocol (PPTP) PPTP uses a
control channel over TCP PPTP was the first VPN protocol that was
supported by Microsoft Dial-up Networking Many security
vulnerabilities found; no longer recommended by Microsoft
- Slide 5
- L2TP & SSL VPNs Layer 2 Tunneling Protocol (L2TP) VPN
Concentrator (LAC) LNS Site-to-site VPN connection Uses IPSec for
security of connection
- Slide 6
- L2TP & SSL VPNs SSL VPNs Other options than PPTP and L2TP.
OpenVPN Pure IPSec connections are possible. Security encoded
directly into application
- Slide 7
- Virtual LANs Security CamerasUsers Printers VoIP Phones
- Slide 8
- Virtual LANs Users Printers Security Cams Phones
- Slide 9
- Virtual LANs
- Slide 10
- Trunk port Trunking Sw-1 Sw-2 Router Trunk
- Slide 11
- Virtual Trunk Protocol (VTP) Trunking Sw-1Sw-4 Sw-2 Sw-3
- Slide 12
- Configuring a VLAN-capable Switch Managed Switch
- Slide 13
- Configuring a VLAN-capable Switch
- Slide 14
- InterVLAN Routing Mr. Rogers House, VLAN 100 Neighborhood of
Make-Believe, VLAN 101
- Slide 15
- Multilayer Switches Load Balancing QoS and Traffic Shaping
Network Protection
- Slide 16
- Load Balancing
- Slide 17
- Multilayer Switch Using a multilayer or content switch Content
Switch
- Slide 18
- QoS & Traffic Shaping Quality of service (QoS) Traffic
Shaping
- Slide 19
- Network Protection Intrusion Detection/Prevention Intrusion
Detection System (IDS) Intrusion Prevention System (IPS) Port
Mirroring Proxy Servers Port Authentication
- Slide 20
- Questions?