LS 122 104

advertisement
Course Name
VPN Fundamentals
Course Number
LS 122 104
Course Duration
2 days
Course Description
A VPN is a communications environment in which access is
controlled to permit peer connections only within a defined
community of interest, and is constructed though some form of
partitioning of a common underlying communications medium,
where this underlying communications medium provides services to
the network on a non-exclusive basis.
Virtual private networks have become an essential part of today's
business networks, as they provide a cost-effective means of
assuring private internal and external communications over the
shared Internet infrastructure. Virtual Private Networks:
Technologies and Solutions is a comprehensive, practical guide to
VPNs.
VPN Fundamentals includes VPN concepts and architectures,an indepth examination of advanced features and functions such as
tunneling, authentication, access control, VPN gateways, VPN
clients, and VPN network and service management.
This course presents the various technology components, concrete
solutions, and best practices you need to deploy and manage a
highly successful VPN.
Course Objective
After completing this course, attendees will be able to:





Understand IPsec, featuring the Authentication Header,
Encapsulating
Security
Payload,
Internet
Key
Exchange, and implementation details
Understand PPTP, L2F, L2TP, and MPLS as VPN tunneling
protocols
Review Two-party and three-party authentication, including
RADIUS and Kerberos
Explore Public key infrastructure (PKI) concept and its
integration into VPN solutions
Understand Access control policies, mechanisms, and










management, and their application to VPNs
Review VPN gateway functions, including site-to-site intranet,
remote access, and extranet
Review Gateway configuration, provisioning, monitoring, and
accounting
Explore Gateway interaction with firewalls and routers
Understand VPN client implementation issues, including
interaction with operating systems
Understand Client operation issues, including working with NAT,
DNS, and link MTU limits
Explore VPN service and network management architectures
and tunnel and security management
Review successful VPN deployments
Discuss successful and unsuccessful VPN deployments
Step through a practical process for managing a VPN
deployment project
Explore the current and future market trends
Target Audience
IT Managers, Security Officers, Network Engineers, Tech Support
and anyone who is interested in VPN.
Prerequisites
Basic Knowledge of TCP/IP and Networking
Course Module













Introduction
VPN Definition
Potential Uses and Benefits
VPN Motivation
The VPN Market
VPN Requirements
Building Blocks of a VPN
VPN Technologies
VPN Topology
VPN Protocols
VPN versus Mobile IP
VPN Architectures
VPN Requirements, Building Blocks, and Architectures



































Implementer-based VPN Architectures
Security-based VPN Architectures
Layer-based VPN Architectures
Class-based VPN Architectures Site-to-Site Intranet VPNs
Remote Access VPNs
Extranet VPNs
Key Aspects of VPN Security
Overview of Network Security
Internet Architecture
Security Issues Connecting to Internet
Relevant Cryptography
Generic Secure Channel
Cryptography
Shared Key Cryptography
Public Key Cryptography
Digital Signatures
Message Authentication Codes
Tunnels and VPN
Data Integrity and Confidentiality.
VPN Tunneling Protocols
PPTP
L2F
L2TP
Ipsec
MPLS
Point-to-Point Protocol (PPP)
Overview and Basic Operation
Basis for L2 VPN Protocols
Major Components
Wire Authentication Protocols
Backend Authentication Servers
Configuration of Network Protocols
Layer Two VPN Protocols
Common Aspects
Advantages and Disadvantages



































Layer Two Forwarding (L2F)
Point-to-Point Tunneling Protocol (PPTP)
Layer Two Tunneling Protocol (L2TP)
IP Security Protocol (IPSEC)
Basic IPsec Concepts
IPsec and VPNs
Authentication Header (AH)
Encapsulating Security Payload (ESP)
Internet Key Exchange (IKE)
Operational Modes
Security Associations
Mandatory Configurations
Issues with Remote Access
Key Management
ANX Implementation
L2TP with IPSEC
Phase 1 Negotiation
Phase 2 Negotiation
IPsec Implementation
Authentication and access control in VPN
PAP and CHAP
PPP Authentication
RADIUS
S/KEY and OTP
Trusted Third-Party Authentication
Kerberos
X.509 Public Key Infrastructure
Pretty Good Privacy Trust Model
Authentication in VPNs
Gateway-Gateway Authentication
Access Control Policy
Access Control Rules
Access Control Lists
Access Control Policy Management
Access Control in VPNs



































Public Key Infrastructure (PKI) and VPNs
PKI Architecture
Certification
Validation
Trust Models
Digital Certificate Formats
X.509 Digital Certificate
Certificate Management System
Certificate Protocols
Certificate Use in VPNs
VPN SOLUTIONS and implementations
Assessing Your Environment and Needs
Design Methodology
Basic Administrative Tasks
VPN Project Management
Successful VoIP deployments
A practical process for managing a VoIP deployment project
VPN Gateways.
Gateway Configuration and Provisioning
VPN Gateway and Firewall
VPN Design Issues
A VPN Solution Scenario
VPN Clients
Alternative VPN Clients
A Remote Access VPN Scenario
QOS and Performance Issues
Factors Affecting Performance
QOS Defined
TCP Operation
Broad Protocol Options
Applicability to VPNs
Role of the ISP
Multiprotocol Label Switching (MPLS)
Evolution of Typical ISP Backbone
Attempts at Switching IP Traffic

















Applicability to VPNs
VPN Network and Service Management
Network Management Architecture
Network Management Protocols
Applicable MIBs and Probes
SNMP Issues
VPN Service Management.
Service Level Agreement.
Network Operations Center (NOCs)
Redundancy and Load-balancing
Integration with Existing Security
Survey of VPN Products and Services
Product Categories
Vendor Survey
Factors in Product Selection
Outsourcing Options
Future Trends
Download