Different Types of Networks/VPN
IPSec
A set of protocols developed by the IETF to support secure exchange of packets at the IP layer.
PPTP
Short for Point-to-Point Tunneling Protocol, a new technology for creating VPNs, developed jointly by Microsoft, U.S. Robotics and several remote access vendor companies, known collectively as the PPTP Forum.
SAN = +
Storage area network (SAN): A high-speed network of storage devices that also connects those storage devices with servers.
The other commonly used encryption system is a ___________________ in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message
Symmetric-key encryption system
Intranet =
A network based on TCP/IP protocols (an intranet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees or others with authorization
Extranet =
An extranet refers to an intranet that is partially accessible to authorized outsiders. Whereas an intranet resides behind a firewall and is accessible only to people who are members of the same company or organization, an extranet provides various levels of accessibility to outsiders
A VPDN is a user-to-_____connection, where remote users need to connect to the company
LAN LAN
_____________is also an important component of a secure VPN
Encryption
A WAN is two or more ___________ networked together
LAN's
HAN =+
Home-area network (HAN): A network contained within a user's home that connects a person's digital devices
there are three main network protocols for use with VPN tunnels, which are generally incompatible with each other. They include the following:
IPSec PPTP L2TP
LAN = +
Local Area Network The computers are geographically close together (that is, in the same building).
MAN = +
Metropolitan-area network (MAN): A data network designed for a town or city.
Here the company will have a service provider set-up a __________________and provide the remote users with the software needed to reach the ______from their desktop computer or laptop
NAS (network access server) NAS
IPsec supports two encryption modes
Transport and Tunnel.
Companies and organizations will use a -____________ to communicate confidentially over a public network and to send voice, video or data.
VPN
VPN= +
Virtual private network (VPN): A network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network.
There are two main types of tunneling used in virtual private networks.
Voluntary tunneling compulsory tunneling
WAN = +
Wide-area network (WAN): The computers are farther apart and are connected by telephone lines or radio waves
Types of encryption commonly used include public-key encryption which is a system that uses two keys —
a public key known to everyone and a private or secret key known only to the recipient of the message.
In compulsory tunneling the service provider manages the VPN connection and
brokers the connection between that client and a VPN server.
You will have a firewall site between the _____________________________,which is the connection point to the private network. The remote user will establish an authenticated connection with the firewall.
client (which is the remote users workstation) and the host server,
Voluntary tunneling is where the client makes a connection to the service provider then the VPN client
creates the tunnel to the VPN server once the connection has been made
Transport mode encrypts only the _____________) of each packet, but leaves the ______ untouched________________
data portion (payload header
If you're using a public line to connect to a private network, then you might wonder what makes a virtual private network private? The answer is the manner in which the VPN is
designed.
Secure intranets are now the -_______________of the Internet because they are much less expensive to build and manage than private networks based on proprietary protocols.
fastest-growing segment
Depending on the type of VPN you decide to implement, either remote-access or site-to-site, you will need specific components to build your VPN. These standard components include a software client for each remote workstation, dedicated hardware, such as a
firewall or a product like the Cisco VPN Concentrator, a VPN server, and a Network Access Server (NAS).
The first step to VPN security is usually a
firewall.
For IPsec to work, the sending and receiving devices must share a
public key
A VPN is designed to provides a _________________in which to transmit the data between the remote user and the company network. The information transmitted between the two locations via the encrypted tunnel cannot .
secure, encrypted tunnel be read by anyone else
Another type of VPN is commonly called a ____________ VPN. Here the company would invest in dedicated hardware to connect multiple sites to their ____ though a public network, usually the Internet. Site-to-site VPNs are either intranet or extranet-based.
site-to-site LAN
For a VPDN, the secure and encrypted connection between the company's network and remote users is provided by
the third-party service provider.
With a VPN you'll need to establish a network connection that is based on the idea of
tunneling.
A network is a group of __________computer systems or other devices that are linked together to exchange data.
two or more
You can access an extranet only if you have a _____________________, and your identity determines which parts of the extranet you can view.
valid username and password
One of the most common types of VPNs is a
virtual private dial-up network (VPDN)