Chapter 06 teleworker services
Trang 1Chapter 6: Teleworker Services
CCNA Exploration 4.0
Trang 2Objectives
teleworker services, including the differences between
private and public network infrastructures
architecture for providing teleworking services
using DSL, cable, and wireless technology
role and benefits for enterprises and teleworkers
secure teleworker services to an enterprise network
Trang 3Business Requirements for
Teleworker Services
Trang 5The Teleworker Solution
networks to connect corporate headquarters, branch offices, and suppliers
organizations for supporting teleworker services:
Frame Relay, ATM, and leased lines, provide many
remote connection solutions The security of these
connections depends on the service provider
scalable connectivity
Trang 6The Teleworker Solution
Trang 7Teleworker Solution Components
Trang 8Broadband Services
Trang 9Connecting Teleworkers to the WAN
e-mail, web-based applications, mission-critical applications, real-time collaboration, voice, video, and videoconferencing) that require a high-bandwidth connection
address when connecting teleworkers
• Dialup access
modem To connect to the ISP, a user calls the ISP
access phone number
Trang 10Connecting Teleworkers to the WAN
DSL
provides a faster connection
signal from the telephone signal and provides an Ethernet
connection to a host computer or LAN
Trang 11Connecting Teleworkers to the WAN
Satellite
modem that transmits radio signals to the nearest point of
presence (POP) within the satellite network
Trang 12Connecting Teleworkers to the WAN
Cable modem
signal is carried on the same coaxial cable that delivers
cable television A special cable modem separates the
Internet signal from the other signals carried on the cable
and provides an Ethernet connection to a host computer or LAN
Trang 13option used by teleworkers to access their enterprise
network
frequency (RF) signals across the network Coaxial cable is the primary medium used to build cable TV systems
form of transmission shared TV signals
signals and improve over-the-air TV reception
transmission
Trang 14What is a Cable System
Trang 15What is a Cable System
Trang 16Sending Digital Signals over Radio Waves
Trang 17(DOCSIS) is a standard for certification of cable equipment vendor devices (cable modem and cable modem termination system)
– Physical layer: DOCSIS specifies the channel widths
– MAC layer - Defines a deterministic access method,
Trang 18Sending Data over Cable
• Delivering services over a cable network requires different radio
frequencies Downstream frequencies are in the 50 to 860 MHz range, and the upstream frequencies are in the 5 to 42 MHz range
• Two types of equipment are required to send digital modem signals
upstream and downstream on a cable system:
– Cable modem termination system (CMTS) at the headend of the
cable operator
– Cable modem (CM) on the subscriber end
Trang 19Sending Data over Cable
• CMTS (Cable Modem Termination System): is a component
that exchanges digital signals with cable modems on a cable network A headend CMTS communicates with CMs that are located in subscriber homes
• CM (Cable Modem): enables you to receive data at high
speeds Typically, the cable modem attaches to a standard 10BASE-T Ethernet card in the computer
optic cable
as 2000 subscribers
and carry RF signals to the subscriber
Trang 20DSL
installed copper wires
copper lines
kilometers (3.5 miles)
(ADSL) and symmetric (SDSL)
Trang 21DSL
Trang 22DSL
either end of a copper wire that extends between the CPE
and the DSL access multiplexer (DSLAM)
DSLAM:
– Transceiver: Connects the computer of the teleworker to
the DSL Usually is a DSL modem connected to the
computer using a USB or Ethernet cable Newer DSL
transceivers can be built into small routers with multiple
10/100 switch ports suitable for home office use
– DSLAM: Located at the CO of the carrier, the DSLAM
combines individual DSL connections from users into one high-capacity link to an ISP, and thereby, to the Internet
Trang 23DSL is not a shared medium Each user has a separate
direct connection to the DSLAM Adding users does not
impede performance, unless the DSLAM Internet connection
Trang 24ADSL
same wire pair
Trang 25low-pass filter with two ends
Trang 26ADSL
the POTS traffic
Trang 27wireless access point:
limits the local
transmission range
(typically less than
Trang 28Broadband Wireless
connections has been extended
increasing wireless availability These include:
Trang 29Municipal Wi-Fi
home deployment
• Mesh
Trang 30WiMAX
telecommunications technology aimed at providing wireless data over long distances in a variety of ways, from point-to-
point links to full mobile cellular type access
Trang 31Satellite Internet
including for vessels at sea, airplanes in flight, and vehicles moving on land
•
Trang 32Broadband Wireless
uses the 2.4 GHz range
complying with these standards:
2.4 GHz
70 Mb/s, and has a range of up to 30 miles (50 km) It can
operate in licensed or unlicensed bands of the spectrum
from 2 to 6 GHz
Trang 33VPN Technology
Trang 34What is a VPN?
networks over the public Internet infrastructure that maintain confidentiality and security
Trang 35What is a VPN?
over a public network
infrastructure that connects branch offices, home offices,
business partner sites, and remote telecommuters to all or
portions of their corporate network
secure and reliable manner using the Internet as the medium
to connect to the private LAN
locations much easier than a leased line
Trang 36VPNs and Their Benefits
• Cost savings: Organizations can use cost-effective,
third-party Internet transport to connect remote offices and users
to the main corporate site This eliminates expensive
dedicated WAN links and modem banks By using
broadband, VPNs reduce connectivity costs while increasing remote connection bandwidth
• Security: Advanced encryption and authentication protocols
protect data from unauthorized access
• Scalability: VPNs use the Internet infrastructure within ISPs
and carriers, making it easy for organizations to add new
users Organizations, big and small, are able to add large
amounts of capacity without adding significant infrastructure
Trang 37Types of VPNs: Site-to-site VPNs
locations in the same way as a leased line or Frame Relay
connection is used
Trang 38Types of VPNs: remote Access VPNs
• Mobile users and telecommuters use remote access VPNs
extensively.
• Most teleworkers now have access to the Internet from their
homes and can establish remote VPNs using broadband
connections
• Each host typically has VPN client software
• Can use VPN concentrator, ASA, router or Firewall to terminate a VPN
Trang 39VPN Components
Trang 40Characteristics of Secure VPNs
permit organizations to establish secure, end-to-end, private network connections over the Internet
– Data Confidentiality: Protects data from eavesdroppers
(spoofing)
– Data Integrity: Guarantees that no tampering or
alterations occur
– Authentication: Ensures that only authorized senders
and devices enter the network
and encapsulation
Trang 41VPN Tunneling
to carry data for users as though the users had access to a private network
packet and sends the new, composite packet over a
network
Trang 42VPN Tunneling
Trang 43VPN Data Integrity
Trang 44VPN Data Integrity
Trang 45VPN Data Integrity
Trang 46VPN Data Integrity: VPN Authentication
integrity and the authenticity of a message
data integrity algorithm that guarantees the integrity of the
message
Trang 47VPN Data Integrity: VPN Authentication
• A HMAC has two parameters: a message input and a secret key known only to the message originator and intended receivers.
• The cryptographic strength of the HMAC depends upon the
cryptographic strength of the underlying hash function, on the size and quality of the key, and the size of the hash output length in
bits.
• Two common HMAC algorithms:
– Message Digest 5 (MD5): Uses a 128-bit shared secret key
– Secure Hash Algorithm 1 (SHA-1): Uses a 160-bit secret key
• The device on the other end of the VPN tunnel must be
authenticated before the communication path is considered secure
– Pre-shared key (PSK)
– RSA signature
Trang 48IPsec Security Protocols
provides encryption, integrity, and authentication
communications, but relies on existing algorithms
Trang 49IPsec Security Protocols
authentication, and key exchange Some of the standard
algorithms that IPsec uses are as follows:
DES
length used, and faster throughput
Trang 50IPsec Security Protocols
chooses the algorithms used to implement the security
services within that framework
Trang 51Scenario: 6.3.7.2
Trang 52Scenario: 6.3.7.3
Trang 53teleworker services, including the differences between
private and public network infrastructures
architecture for providing teleworking services
using DSL, cable, and wireless technology
role and benefits for enterprises and teleworkers
secure teleworker services to an enterprise network