natalie de koker, lindsay haley, jordan lunda, matty ott
TRANSCRIPT
- Slide 1
- Slide 2
- Natalie De Koker, Lindsay Haley, Jordan Lunda, Matty Ott
- Slide 3
- Virtual Private Networks
- Slide 4
- PPTP VPNs Point-to-Point Tunneling Protocol (PPTP) PPTP uses a control channel over TCP PPTP was the first VPN protocol that was supported by Microsoft Dial-up Networking Many security vulnerabilities found; no longer recommended by Microsoft
- Slide 5
- L2TP & SSL VPNs Layer 2 Tunneling Protocol (L2TP) VPN Concentrator (LAC) LNS Site-to-site VPN connection Uses IPSec for security of connection
- Slide 6
- L2TP & SSL VPNs SSL VPNs Other options than PPTP and L2TP. OpenVPN Pure IPSec connections are possible. Security encoded directly into application
- Slide 7
- Virtual LANs Security CamerasUsers Printers VoIP Phones
- Slide 8
- Virtual LANs Users Printers Security Cams Phones
- Slide 9
- Virtual LANs
- Slide 10
- Trunk port Trunking Sw-1 Sw-2 Router Trunk
- Slide 11
- Virtual Trunk Protocol (VTP) Trunking Sw-1Sw-4 Sw-2 Sw-3
- Slide 12
- Configuring a VLAN-capable Switch Managed Switch
- Slide 13
- Configuring a VLAN-capable Switch
- Slide 14
- InterVLAN Routing Mr. Rogers House, VLAN 100 Neighborhood of Make-Believe, VLAN 101
- Slide 15
- Multilayer Switches Load Balancing QoS and Traffic Shaping Network Protection
- Slide 16
- Load Balancing
- Slide 17
- Multilayer Switch Using a multilayer or content switch Content Switch
- Slide 18
- QoS & Traffic Shaping Quality of service (QoS) Traffic Shaping
- Slide 19
- Network Protection Intrusion Detection/Prevention Intrusion Detection System (IDS) Intrusion Prevention System (IPS) Port Mirroring Proxy Servers Port Authentication
- Slide 20
- Questions?