Those who preparing CCNA,CCNP,CCSP,CCIP exams its best tool to practice
Wednesday, September 29, 2010
Practicing Network routing and swicthing
Those who preparing CCNA,CCNP,CCSP,CCIP exams its best tool to practice
Saturday, August 14, 2010
VPN
A well-designed VPN can greatly benefit a company. For example, it can:
- Extend geographic connectivity
- Improve security
- Reduce operational costs versus traditional WAN
- Reduce transit time and transportation costs for remote users
- Improve productivity
- Simplify network topology
- Provide global networking opportunities
- Provide telecommuter support
- Provide broadband networking compatibility
- Provide faster ROI (return on investment) than traditional WAN
What features are needed in a well-designed VPN? It should incorporate:
- Security
- Reliability
- Scalability
- Network management
- Policy management
A VPN supports at least three different modes of use:
Benefit : Significant cost savings by reducing the burden of long distance charges associated with dial-up access. Also helps increase productivity and peace of mind by ensuring secure network access regardless of where an employee physically is.
Benefit : Substantial cost savings over traditional leased-line or frame relay technologies through the use of Internet to bridge potentially long distances between sites.
Benefit : Businesses enjoy the same policies as a private network, including security, QoS, manageability, and reliability.
The packets will encapsulated with tunneling protocol,later packet will De-encapsulted at client.
Tunneling Protocols
1.PPTP - point to point tunneling protocol. working L2
Developed microsoft and security issues.
2.L2TP -Layer 2 tunneliny - woring in l2
Enhanced PPTP with security features by cisco -
3. IP sec - working @ L3
4.Socks
These protocols will do encryption and authentication.IPSEC -
Encrytption - DES,3DES,MD5 DH ( Diffe Helman )
Authentication : SHA1,MD5,RSA
crypto ipsec transform-set
<name> ah-md5-hmac esp-des
show crypto isakmp sa
VPN tunneling
logical connection to Client and server.The packets will encapsulated with tunneling protocol,later packet will De-encapsulted at client.
Tunneling Protocols
1.PPTP - point to point tunneling protocol. working L2
Developed microsoft and security issues.
2.L2TP -Layer 2 tunneliny - woring in l2
Enhanced PPTP with security features by cisco -
3. IP sec - working @ L3
4.Socks
These protocols will do encryption and authentication.IPSEC -
Encrytption - DES,3DES,MD5 DH ( Diffe Helman )
Authentication : SHA1,MD5,RSA
crypto ipsec transform-set
<name> ah-md5-hmac esp-des
show crypto isakmp sa
Labels:
Types of VPN tunneling,
VPN,
VPN tunneling
Location:
Karnataka, India
Subscribe to:
Posts (Atom)