+ All Categories
Home > Documents > Module 10: Providing Secure Access to Remote Offices.

Module 10: Providing Secure Access to Remote Offices.

Date post: 18-Jan-2016
Category:
Upload: felicia-walton
View: 214 times
Download: 1 times
Share this document with a friend
13
Module 10: Providing Secure Access to Remote Offices
Transcript
Page 1: Module 10: Providing Secure Access to Remote Offices.

Module 10: Providing Secure Access to Remote

Offices

Page 2: Module 10: Providing Secure Access to Remote Offices.

Overview

Defining Private and Public Networks

Securing Connections Using Routers

Securing VPN Connections Between Remote Offices

Identifying Security Requirements

Page 3: Module 10: Providing Secure Access to Remote Offices.

Defining Private and Public Networks

Seattle

Public Networks

Tokyo

Private NetworksSeattle

Private Networks

Tokyo

Dedicated Connection

InternetInternet

Page 4: Module 10: Providing Secure Access to Remote Offices.

Securing Connections Using Routers

Introducing Router Security

Using a Windows 2000–based Router

Page 5: Module 10: Providing Secure Access to Remote Offices.

Introducing Router Security

Router

Seattle

Router

Tokyo

Packet FilteringMutual Authentication

Packet FilteringMutual Authentication

EncryptionEncryption

Page 6: Module 10: Providing Secure Access to Remote Offices.

Using a Windows 2000–based Router

Network Address Translation

IP Packet Filtering

Virtual Private Network

CorporateOffice

RemoteOffices

Windows 2000-basedRouter

Windows 2000-based Router

Windows 2000-basedRouter

InternetInternet

Page 7: Module 10: Providing Secure Access to Remote Offices.

Securing VPN Connections Between Remote Offices

Connecting Remote Offices over Private Networks

Connecting Remote Offices over Public Networks

Selecting a Tunneling Protocol

Virtual Private Network

Tunnel

Page 8: Module 10: Providing Secure Access to Remote Offices.

Connecting Remote Offices over Private Networks

HR SeattleHR SeattleHR TokyoHR Tokyo

VPN Tunnel

Windows 2000–based Routers

Page 9: Module 10: Providing Secure Access to Remote Offices.

Connecting Remote Offices over Public Networks

Tokyo

Seattle

ISPISP

ISPISP

InternetInternet

Page 10: Module 10: Providing Secure Access to Remote Offices.

Selecting a Tunneling Protocol

FeaturesFeaturesFeaturesFeaturesTunneling ProtocolTunneling Protocol

L2TP/L2TP/ IPSecIPSec

PPTPPPTP IPSecIPSec Tunnel Mode Tunnel Mode

Support for NAT X

User Authentication X X

Machine Authentication X X

Multi-Protocol Support X X X

Stronger Security X X

Support for Non–Windows 2000–based Clients X

Page 11: Module 10: Providing Secure Access to Remote Offices.

Identifying Security Requirements

Step 1: Determine What Must Be SecuredStep 1: Determine What Must Be Secured

Step 2: Determine the Level of Security to ApplyStep 2: Determine the Level of Security to Apply

Step 3: Determine Encryption RequirementsStep 3: Determine Encryption Requirements

Page 12: Module 10: Providing Secure Access to Remote Offices.

Lab A: Planning Secure Connections for Remote Offices

Page 13: Module 10: Providing Secure Access to Remote Offices.

Review

Defining Private and Public Networks

Securing Connections Using Routers

Securing VPN Connections Between Remote Offices

Identifying Security Requirements


Recommended