Module 10: Providing Secure Access to Remote Offices.
-
Upload
felicia-walton -
Category
Documents
-
view
214 -
download
1
Transcript of Module 10: Providing Secure Access to Remote Offices.
![Page 1: Module 10: Providing Secure Access to Remote Offices.](https://reader036.fdocuments.us/reader036/viewer/2022062805/5697bfdf1a28abf838cb2b33/html5/thumbnails/1.jpg)
Module 10: Providing Secure Access to Remote
Offices
![Page 2: Module 10: Providing Secure Access to Remote Offices.](https://reader036.fdocuments.us/reader036/viewer/2022062805/5697bfdf1a28abf838cb2b33/html5/thumbnails/2.jpg)
Overview
Defining Private and Public Networks
Securing Connections Using Routers
Securing VPN Connections Between Remote Offices
Identifying Security Requirements
![Page 3: Module 10: Providing Secure Access to Remote Offices.](https://reader036.fdocuments.us/reader036/viewer/2022062805/5697bfdf1a28abf838cb2b33/html5/thumbnails/3.jpg)
Defining Private and Public Networks
Seattle
Public Networks
Tokyo
Private NetworksSeattle
Private Networks
Tokyo
Dedicated Connection
InternetInternet
![Page 4: Module 10: Providing Secure Access to Remote Offices.](https://reader036.fdocuments.us/reader036/viewer/2022062805/5697bfdf1a28abf838cb2b33/html5/thumbnails/4.jpg)
Securing Connections Using Routers
Introducing Router Security
Using a Windows 2000–based Router
![Page 5: Module 10: Providing Secure Access to Remote Offices.](https://reader036.fdocuments.us/reader036/viewer/2022062805/5697bfdf1a28abf838cb2b33/html5/thumbnails/5.jpg)
Introducing Router Security
Router
Seattle
Router
Tokyo
Packet FilteringMutual Authentication
Packet FilteringMutual Authentication
EncryptionEncryption
![Page 6: Module 10: Providing Secure Access to Remote Offices.](https://reader036.fdocuments.us/reader036/viewer/2022062805/5697bfdf1a28abf838cb2b33/html5/thumbnails/6.jpg)
Using a Windows 2000–based Router
Network Address Translation
IP Packet Filtering
Virtual Private Network
CorporateOffice
RemoteOffices
Windows 2000-basedRouter
Windows 2000-based Router
Windows 2000-basedRouter
InternetInternet
![Page 7: Module 10: Providing Secure Access to Remote Offices.](https://reader036.fdocuments.us/reader036/viewer/2022062805/5697bfdf1a28abf838cb2b33/html5/thumbnails/7.jpg)
Securing VPN Connections Between Remote Offices
Connecting Remote Offices over Private Networks
Connecting Remote Offices over Public Networks
Selecting a Tunneling Protocol
Virtual Private Network
Tunnel
![Page 8: Module 10: Providing Secure Access to Remote Offices.](https://reader036.fdocuments.us/reader036/viewer/2022062805/5697bfdf1a28abf838cb2b33/html5/thumbnails/8.jpg)
Connecting Remote Offices over Private Networks
HR SeattleHR SeattleHR TokyoHR Tokyo
VPN Tunnel
Windows 2000–based Routers
![Page 9: Module 10: Providing Secure Access to Remote Offices.](https://reader036.fdocuments.us/reader036/viewer/2022062805/5697bfdf1a28abf838cb2b33/html5/thumbnails/9.jpg)
Connecting Remote Offices over Public Networks
Tokyo
Seattle
ISPISP
ISPISP
InternetInternet
![Page 10: Module 10: Providing Secure Access to Remote Offices.](https://reader036.fdocuments.us/reader036/viewer/2022062805/5697bfdf1a28abf838cb2b33/html5/thumbnails/10.jpg)
Selecting a Tunneling Protocol
FeaturesFeaturesFeaturesFeaturesTunneling ProtocolTunneling Protocol
L2TP/L2TP/ IPSecIPSec
PPTPPPTP IPSecIPSec Tunnel Mode Tunnel Mode
Support for NAT X
User Authentication X X
Machine Authentication X X
Multi-Protocol Support X X X
Stronger Security X X
Support for Non–Windows 2000–based Clients X
![Page 11: Module 10: Providing Secure Access to Remote Offices.](https://reader036.fdocuments.us/reader036/viewer/2022062805/5697bfdf1a28abf838cb2b33/html5/thumbnails/11.jpg)
Identifying Security Requirements
Step 1: Determine What Must Be SecuredStep 1: Determine What Must Be Secured
Step 2: Determine the Level of Security to ApplyStep 2: Determine the Level of Security to Apply
Step 3: Determine Encryption RequirementsStep 3: Determine Encryption Requirements
![Page 12: Module 10: Providing Secure Access to Remote Offices.](https://reader036.fdocuments.us/reader036/viewer/2022062805/5697bfdf1a28abf838cb2b33/html5/thumbnails/12.jpg)
Lab A: Planning Secure Connections for Remote Offices
![Page 13: Module 10: Providing Secure Access to Remote Offices.](https://reader036.fdocuments.us/reader036/viewer/2022062805/5697bfdf1a28abf838cb2b33/html5/thumbnails/13.jpg)
Review
Defining Private and Public Networks
Securing Connections Using Routers
Securing VPN Connections Between Remote Offices
Identifying Security Requirements