You are on page 1of 12

#12.

Infrastructure and Connectivity

AGENDA  Understanding Infrastructure Security .

A VPN requires either special hardware to be installed or a VPN software package running on servers and workstations. With a VPN. VPNs can be used to connect LANs together across the Internet or other public networks. the remote end appears to be connected to the network as if it were connected locally.Virtual Private Networks  A virtual private network (VPN) is a private network connection that occurs through a public network. . A private network provides security over an otherwise unsecure environment.

Figure 3. IPSec. This connection appears to be a local connection.Virtual Private Networks  VPNs typically use a tunneling protocol such as Layer 2 Tunneling Protocol (L2TP). . or Point-to-Point Tunneling Protocol (PPTP).9 shows a remote network being connected to a LAN using the Internet and a VPN. and all message traffic and protocols are available across the VPN.

.

. including proprietary technologies. is available for VPN support. A wide range of options. VPNs are used to make connections between private networks across a public network. such as the Internet. These connections aren’t guaranteed to be secure unless a tunneling protocol (such as PPTP) and an encryption system (such as IPSec) are used.Virtual Private Networks  As mentioned earlier.

 VPN systems can be dedicated to a certain protocol.Virtual Private Networks  Many of the large ISPs and data communications providers offer dedicated hardware with VPN capabilities. . Many servers also provide software VPN capabilities for use between two networks. or they can pass whatever protocols they see on one end of the network to the other end. A pure VPN connection appears as a dedicated wired connection between the two network ends.

Wireless Access Points  It does not take much to build a wireless network. you need a wireless network card (NIC) in place of the standard wired NIC. On the network side. . On the client side. you need something to communicate with the clients.

which is strategically placed for access. also known as a transceiver. including IEEE 802. . A wireless access point (WAP) is a low-power transmitter/receiver. The portable device and the access point communicate using one of several communications protocols.11 (also known as Wireless Ethernet).Wireless Access Points  The primary method of connecting a wireless device to a network is via a wireless portal.

Wireless Access Points  Wireless communication methods are becoming more prevalent in computing because the cost of the transmitting and receiving equipment has fallen drastically over the last few years. . Most wireless frequencies are shared frequencies in that more than one person may be using the same frequency for communication. a building. Wireless also offers mobile connectivity within a campus. or even a city.

or even a city. a building. Wireless also offers mobile connectivity within a campus. .Wireless Access Points  Wireless communication methods are becoming more prevalent in computing because the cost of the transmitting and receiving equipment has fallen drastically over the last few years. Most wireless frequencies are shared frequencies in that more than one person may be using the same frequency for communication.

Most wireless frequencies are shared frequencies in that more than one person may be using the same frequency for communication. Wireless also offers mobile connectivity within a campus.Wireless Access Points  Wireless communication methods are becoming more prevalent in computing because the cost of the transmitting and receiving equipment has fallen drastically over the last few years. a building. or even a city. .