Preview

1IP Tunneling And VPN Technologies

Powerful Essays
Open Document
Open Document
12448 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
1IP Tunneling And VPN Technologies
IP Tunneling and VPNs

Overview
The purpose of this module is to explain Virtual Private Network (VPN) concepts and to overview various L2 and L3 tunneling techniques that allow for implementation of VPNs. The access VPN features in Cisco IOS Release 12.1 are explained along with Layer 2 and Layer 3 tunneling mechanisms.

Objectives
Upon completion of this module, you will be able to perform the following tasks: n Explain Virtual Private Network concepts and possibilities

n

Describe Layer-2 tunneling features

n

Configure support for Microsoft Point-to-Point Tunneling Protocol (PPTP) and
Encryption (MPPE)

n

Configure L2TP Dial-in and Virtual Private Dial-up Network (VPDN) for dialin

n

Describe and configure GRE Layer-3 tunneling

Introduction to IP VPNs
Objectives
Upon completion of this module, you will be able to perform the following tasks:

23-2

IP Tunneling and VPNs

n

Define a Virtual Private Network (VPN) and its benefits

n

Describe the various types of VPNs:


Access, intranet, extranet



Layer 2 versus Layer 3



Carrier-provided versus not

Copyright  2001, Cisco Systems, Inc.

What Are VPNs?
Connectivity deployed on a shared infrastructure with the same policies and performance as a private network, with lower total cost of ownership
Regional Sites

Virtual Private
Network

Branches
SoHo
Telecommuters
Mobile Users

Central /HQ

Internet, IP, FR, ATM
© 2001, Cisco Systems, Inc.

Partners

Customers
IP Tunneling and VPNs -5

We will start by defining a VPN.
An academic definition of a VPN is “connectivity deployed on a shared infrastructure with the same policies and performance as a private network, with lower total cost of ownership.”
The infrastructure is public, and can be either the Internet, an IP infrastructure, a
Frame Relay network, or an Asynchronous Transfer Mode (ATM) WAN. Our focus today is on the big “I,” the public Internet and IP VPNs, to the exclusion of
Frame Relay and ATM.

Copyright  2001, Cisco Systems, Inc.

IP

You May Also Find These Documents Helpful

  • Best Essays

    Munasinghe, K. S. and Shahrestani, S.A.,“Analysis of Multiple Virtual Private Network Tunnels over Wireless LANs,” in Proceedings of the 3rdInternational Business Information Management Conference (IBIMA 2004), pp. 206-211, December 2004b.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Good Essays

    1. Research the following organizations and explain their involvement with the internet public IP addresses.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    1. Research the following organizations and explain their involvement with the Internet public IP addresses…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    With admirable foresight, the Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6), as a worthy tool to phase out and supplant IPv4 over the coming years. There is an explosion of sorts in the number and range of IP capable devices that are being released in the market and the usage of these by an increasingly tech savvy global population. The new protocol aims to effectively support the ever-expanding Internet usage and functionality, and also address security concerns.…

    • 981 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 310 Words
    • 1 Page

    1. Research the following organizations and explain their involvement with the Internet public IP addresses…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The Internet is vulnerable to myriads kinds of attacks, due to vulnerabilities in the TCP-IP protocol, and no global flow control mechanisms. The two problems lead to many TCP exploits and the horrible DDoS attacks. We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack. The approach uses "hardened routers", routers that can do simple cryptographic functions (encryption, signatures) on all packets flowing in the network, as well as to participate in a hierarchical control network.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 3 Assignment 1

    • 375 Words
    • 2 Pages

    1. Research the following organizations and explain their involvement with the Internet public IP addresses:…

    • 375 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The increase demands of e-business come with a compelling requirement for data security. Virtual Private Network with IP Security Architecture (IPsec VPN) meets this requirement by providing end-to end encryption and authentication at the IPlayer and protecting confidential data that flows over possibly untrustworthy networks. IPsec has the advantage of a wide scope of coverage and agile granularity of protection; however, incompatibilities exist between IPsec VPN and the Network Address Translation (NAT) that firewalls use.…

    • 601 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Its 405 Module 3

    • 1571 Words
    • 7 Pages

    Most industries rely on the Internet and have seen significant gains in production and operations from this technology. Suppliers, customers, vendors, etc. use the Internet for orders, supply tracking, etc. The internet now plays a crucial role in most companies operations. While IPv4 has worked well for us for many years, the problem now lies…

    • 1571 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Final Paper Introduction

    • 578 Words
    • 2 Pages

    First invented in the 1950s by the United State Military during the Cold War, the dynamics of the Internet have gone through a complete transformation. The World Wide Web combined with modern day technology including smart phones, tablet, and laptops, every corner in the globe is open for instant communication. Moreover, combine the ease of use with the…

    • 578 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf>…

    • 5724 Words
    • 23 Pages
    Better Essays
  • Better Essays

    Sullivan, Scott. "Policing the Internet." The FBI Law Enforcement Bulletin. June 1999. Expanded Academic Index. February 25, 2001.…

    • 1159 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lynn, Samara (2011, January 28). IP Addresses Are Running Out: What You Need to Know. PC…

    • 428 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mpls

    • 1876 Words
    • 8 Pages

    Abstract: This paper mainly discusses the outline of the MPLS VPN Layer 3. The information is about the MPLS introduction, VPN, MPLS VPN, Working, VRN Routing Information and BGP distribution. Disadvantages and future security recommendations are also mentioned in the report.…

    • 1876 Words
    • 8 Pages
    Powerful Essays

Related Topics