Different Types of Networks/VPN

¡Supera tus tareas y exámenes ahora con Quizwiz!

IPSec

A set of protocols developed by the IETF to support secure exchange of packets at the IP layer.

PPTP

Short for Point-to-Point Tunneling Protocol, a new technology for creating VPNs, developed jointly by Microsoft, U.S. Robotics and several remote access vendor companies, known collectively as the PPTP Forum.

SAN = +

Storage area network (SAN): A high-speed network of storage devices that also connects those storage devices with servers.

The other commonly used encryption system is a ___________________ in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message

Symmetric-key encryption system

Intranet =

A network based on TCP/IP protocols (an intranet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees or others with authorization

Extranet =

An extranet refers to an intranet that is partially accessible to authorized outsiders. Whereas an intranet resides behind a firewall and is accessible only to people who are members of the same company or organization, an extranet provides various levels of accessibility to outsiders

A VPDN is a user-to-_____connection, where remote users need to connect to the company

LAN LAN

_____________is also an important component of a secure VPN

Encryption

A WAN is two or more ___________ networked together

LAN's

HAN =+

Home-area network (HAN): A network contained within a user's home that connects a person's digital devices

there are three main network protocols for use with VPN tunnels, which are generally incompatible with each other. They include the following:

IPSec PPTP L2TP

LAN = +

Local Area Network The computers are geographically close together (that is, in the same building).

MAN = +

Metropolitan-area network (MAN): A data network designed for a town or city.

Here the company will have a service provider set-up a __________________and provide the remote users with the software needed to reach the ______from their desktop computer or laptop

NAS (network access server) NAS

IPsec supports two encryption modes

Transport and Tunnel.

Companies and organizations will use a -____________ to communicate confidentially over a public network and to send voice, video or data.

VPN

VPN= +

Virtual private network (VPN): A network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network.

There are two main types of tunneling used in virtual private networks.

Voluntary tunneling compulsory tunneling

WAN = +

Wide-area network (WAN): The computers are farther apart and are connected by telephone lines or radio waves

Types of encryption commonly used include public-key encryption which is a system that uses two keys —

a public key known to everyone and a private or secret key known only to the recipient of the message.

In compulsory tunneling the service provider manages the VPN connection and

brokers the connection between that client and a VPN server.

You will have a firewall site between the _____________________________,which is the connection point to the private network. The remote user will establish an authenticated connection with the firewall.

client (which is the remote users workstation) and the host server,

Voluntary tunneling is where the client makes a connection to the service provider then the VPN client

creates the tunnel to the VPN server once the connection has been made

Transport mode encrypts only the _____________) of each packet, but leaves the ______ untouched________________

data portion (payload header

If you're using a public line to connect to a private network, then you might wonder what makes a virtual private network private? The answer is the manner in which the VPN is

designed.

Secure intranets are now the -_______________of the Internet because they are much less expensive to build and manage than private networks based on proprietary protocols.

fastest-growing segment

Depending on the type of VPN you decide to implement, either remote-access or site-to-site, you will need specific components to build your VPN. These standard components include a software client for each remote workstation, dedicated hardware, such as a

firewall or a product like the Cisco VPN Concentrator, a VPN server, and a Network Access Server (NAS).

The first step to VPN security is usually a

firewall.

For IPsec to work, the sending and receiving devices must share a

public key

A VPN is designed to provides a _________________in which to transmit the data between the remote user and the company network. The information transmitted between the two locations via the encrypted tunnel cannot .

secure, encrypted tunnel be read by anyone else

Another type of VPN is commonly called a ____________ VPN. Here the company would invest in dedicated hardware to connect multiple sites to their ____ though a public network, usually the Internet. Site-to-site VPNs are either intranet or extranet-based.

site-to-site LAN

For a VPDN, the secure and encrypted connection between the company's network and remote users is provided by

the third-party service provider.

With a VPN you'll need to establish a network connection that is based on the idea of

tunneling.

A network is a group of __________computer systems or other devices that are linked together to exchange data.

two or more

You can access an extranet only if you have a _____________________, and your identity determines which parts of the extranet you can view.

valid username and password

One of the most common types of VPNs is a

virtual private dial-up network (VPDN)


Conjuntos de estudio relacionados

Ch 16: Mental Health Promotion for Children and Adolescents

View Set

ATI - Fundamentals Practice Quiz 1

View Set

Basices of Electrical Systems ch.15

View Set