WAN, VPN and Security Technologies

blackstartΔίκτυα και Επικοινωνίες

26 Οκτ 2013 (πριν από 3 χρόνια και 7 μήνες)

84 εμφανίσεις

WAN, VPN and Security Technologies

Technology

Speed

Media

Comment

ISDN

128 Kbps (BRI)

Copper

Digital Service over existing
telephone wire. Still a dial
-
up
service.

FDDI

100 Mbps

Fiber

Data Link Protocol. Both LAN
and WAN.

ATM

25.6 Mbps tp 2.46 Gbps

Fiber, UTP

53 Byte Cells. Can use ot
her
services like leased lines and
SONET as well.

Frame Relay

64 Kbps to 1.544 Mbps


Connect to Cloud and creat
Permanent Virtual Circuits
(PVC)

T Carrier/ E Carrier



T1/E1

1.544/2.048 Mbps



T3/E3

44.736/34.368 Mbps



T4/E4

274/139.264 Mbps



SONE
T/SDH

Fiber


OC
-
1

51.84 Mbps



OC
-
3

155.52 Mbps



OC
-
12

622.08 Mbps




Technology

Definition

IPSec


Defines securing data over LAN using Authentication and Encryption.
Uses two protocols that insert headers into IP datagram. IP
Authentication hear
d and IP Encapsulating Security Payload. Provides
End to End security. Both source and destination must be running
IPSec
.

Layer 2
Tunneling
Protocol


Virtual Private Networking (VPN) protocol that tunnels but has no built
in encryption. UDP (Transport
Layer) datagrams usually encapsulated
with IPSec ESP Protocol. Supports multiple network Layer protocols
(Like IP and IPX)

Point to Point
Tunneling
Protocol
(PPTP)


Point
-
to
-
Point Tunneling Protocol (PPTP) is a popular VPN tunneling
protocol. PPTP is des
igned to establish a private channel between
communicating systems (usually a client and a server computer) in a
public network like the Internet. The protocol encapsulates data and
information/control packets using the Internet Generic Routing
Encapsulati
on protocol version 2 (GREv2).

Secure Sockets
Layer (SSL)

Protocol Designed to Secure data as it passes over network. Only
encrypts data exchanged between web servers and clients.

Kerberos


Authentication Protocol that directory services use to provide
single
sign on. The

Kerberos program acts as a trusted third party that knows
and will vouch for the identities of the organizations that want to
communicate. When two parties want to communicate, they go to the
Kerberos
server which

authenticate
s

the pri
ncipals and issue a session
key for them to use. The principals can then use the
symmetric

algorithms to talk to each other.