Instructors Notes

advertisement
Network+ Guide to Networks, 6th Edition
Chapter 10
Virtual Network and Remote Access
At a Glance
Instructor’s Manual Table of Contents

Overview

Objectives

Teaching Tips

Quick Quizzes

Class Discussion Topics

Additional Projects

Additional Resources

Key Terms
10-1
Network+ Guide to Networks, 6th Edition
10-2
Lecture Notes
Overview
This chapter describes the networking components of virtual environments beyond the virtual
LAN or VLAN. It discusses virtualization along with the tools used to provide remote access
and various remote access technologies. These technologies cover both network access and
remote access to computing resources (desktops or client computers).
Chapter Objectives
After reading this chapter and completing the exercises, the student will be able to:
 Explain virtualization and identify characteristics of virtual network components
 Create and configure virtual servers, adapters, and switches as part of a network
 Describe techniques for incorporating virtual components in VLANs
 Explain methods for remotely connecting to a network, including dial-up networking,
virtual desktops, and thin clients
 Discuss VPNs (virtual private networks) and the protocols they rely on
 Identify the features and benefits of cloud computing and NaaS (Network as a Service)
Teaching Tips
Virtualization
1. Describe the basic terminology of virtualization.
2. Use Figure 10-1 to describe the components of a virtualization environment.
3. Explain the advantages of virtualization.
4. Explain the disadvantages of virtualization.
5. Explain that all virtualization providers have similar functionality, but differ in features,
interfaces, and ease of use.
Teaching
Tip
Ensure that students understand that the use of virtualization is a convenience,
but that the convenience comes with a high price and potential for server sprawl
caused by virtualization.
Network+ Guide to Networks, 6th Edition
10-3
Virtual Network Components
1. Explain that virtual machines must connect to physical networks and the components
that connect virtual machines to the physical network are the virtual network
components inside the host machine.
Virtual Machines and Adapters
1. Explain that a VM’s software and hardware characteristics are assigned when it is
created in the virtualization program.
2. Use Figure 10-2 as an example of specifying the hardware resources of a virtual
machine.
3. Explain the purpose of the vNIC.
4. Use Figure 10-3 as an example of a virtual network adapter’s settings.
5. Remind students that every vNIC assigned to a virtual machine has a new MAC address
assigned to it at creation.
Virtual Switches and Bridges
1. Explain the function of virtual switches and virtual bridges.
2. Use Figure 10-4 to explain the connections between virtual machines via a virtual
switch.
3. Explain that the hypervisor controls virtual switches and bridges in the memory of the
host computer.
4. Explain that virtual switches offer users the ability to configure the network traffic any
way that they need for the various applications that are being run by the user.
5. Use Figure 10-5 to show an example of virtual switches passing traffic through a router.
Network Connection Types
1. Explain that whenever you configure a virtual NIC, you will need to select the
connection type for the interface.
2. Define the three modes of connection common to virtual connections: bridged, NAT,
and host-only.
3. Explain the benefits of the bridged networking mode, such as Internet facing servers.
4. Define the services that one might need to provide on a bridged network connection.
Network+ Guide to Networks, 6th Edition
10-4
5. Remind students of the disadvantages of a bridged connection.
6. Use Figures 10-6 and 10-7 to explain a bridged connection.
7. Use Figures 10-8 and 10-9 to show an example of a NAT connection.
8. Explain the services that the host provides for a NAT connection.
9. Discuss the advantages and disadvantages of a NAT connection.
10. Explain the circumstances where you might want to use a host-only connection for a
guest versus the other types.
11. Use Figure 10-10 to demonstrate a host-only connection.
12. Explain the limitations of a host-only connection.
Virtual Appliances
1. Define a virtual appliance.
2. Explain that there are both commercial and non-commercial sources of virtual
appliances.
3. Define the advantages of a virtual appliance over installing software on a traditional
server.
Teaching
Tip
Have students visit the VMWare Solution Exchange to see a list of potential
appliances at https://solutionexchange.vmware.com/store/category_groups/19
Virtual Networks and VLANs
1. Remind students of the function of VLANs from Chapter 6.
2. Explain that physical adapters can present multiple VLANs to a virtual machine host.
3. Explain how VMWare handles VLANs, physical NICs, and port groups.
4. Use Figure 10-11 to explain an example of how you can configure a single NIC to
connect multiple VLANs to virtual guests.
Network+ Guide to Networks, 6th Edition
Teaching
Tip
10-5
Explore the VMWare best practices for using multiple VLANs from VMWare at
http://www.vmware.com/technical-resources/virtual-networking/virtualnetworks.html
Quick Quiz 1
1. True or False: Virtualization is the emulation of a computer, operating system
environment, or application on a physical system.
Answer: True
2. When multiple virtual machines contend for finite physical resources, one virtual
machine could _____ those resources and impair the performance of other virtual
machines on the same computer.
a. reframe
b. repair
c. monopolize
d. optimize
Answer: C
3. The software that allows you to define VMs and manages resource allocation and
sharing among them is known as a virtual machine manager, or, more commonly, a(n)
____________________.
Answer: hypervisor
4. True or False: VMs that must be available at a specific address, such as mail servers or
Web servers, should be assigned host-only network connections.
Answer: False
5. In _____ networking mode, VMs on one host can exchange data with each other and
with their host, but they cannot communicate with any nodes beyond the host.
a. host-only
b. bridged
c. NAT
d. network-only
Answer: A
6. True or False: To add VMs to a VLAN defined on a physical network, you modify a
switch’s configuration.
Answer: False
Network+ Guide to Networks, 6th Edition
10-6
Remote Access and Virtual Computing
1. Explain why a user might need to connect to a remote network for services.
2. Point out that there are a variety of remote access methods that fit various access
scenarios.
3. Explain that dial-up networking, Microsoft’s RAS or RRAS, as well as VPNs, are just
some of many remote access methods.
Dial-Up Networking
1. Define and describe dial-up networking methods.
2. Point out that dial-up networking can use a variety of transmission methods from PSTN
to ISDN.
3. Mention that dial-up networking does not provide either the throughput or reliability
required for many of today’s modern applications.
4. Describe how dial-up networking requires a great deal of an administrator’s time and
energy to properly maintain an appropriate level of service.
Teaching
Tip
Point out that dial-up networking is useful in many scenarios, including a domain
logon: http://www.baudlabs.com/archives/100
Remote Access Servers
1. Explain the purpose of a remote access server.
2. Use Figure 10-12 to explain how remote clients connect via a remote access server.
3. Emphasize that remote access servers come in a variety of configurations, including
dedicated devices and servers with the remote access role.
Remote Access Protocols
1. Define and describe the two most popular remote access protocols, SLIP and PPP.
2. Note that SLIP can only carry IP packets, but that PPP can carry any protocol.
3. Describe the differences between synchronous and asynchronous protocols.
4. Describe the advantages of using PPP over SLIP.
Network+ Guide to Networks, 6th Edition
10-7
5. Emphasize that the flexibility of PPP has caused many ISPs to adopt it using PPP over
Ethernet for many broadband applications.
6. Use Figure 10-16 to explain the placement of PPPoE in the OSI model.
Remote Virtual Computing
1. Point out that there are two main uses of remote virtual computing, which include
remote assistance and access to remote applications (including whole desktops).
2. Describe the advantages of Remote Desktop.
3. Describe the features of VNC (Virtual Network Computing).
4. Describe the advantages of ICA (Independent Computing Architecture).
Teaching
Tip
Students may find more information about the clients available for ICA from
http://www.citrix.com/lang/English/lp/lp_2309126.asp.
VPNs (Virtual Private Networks)
1. Note that virtual private networks establish connections between sites or sites and
clients over public networks.
2. Explain how VPNs can be used to reduce costs for remote workers.
3. Emphasize that the two most important factors with VPNs are interoperability and
security.
4. Review the two classifications of VPNs, client-to-site and site-to-site.
5. Use Figure 10-14 to visualize a site-to-site VPN.
6. Note that the endpoint of each side of a VPN is responsible for encrypting and
decrypting the traffic sent over the link.
7. Use Figure 10-15 to describe a client-to-site VPN.
8. Explain the two most popular VPN tunneling protocols, PPTP and L2TP.
Network+ Guide to Networks, 6th Edition
10-8
Cloud Computing
1. Define cloud computing, which has the following characteristics no matter what kind of
service is offered.
a. Self-service and on demand
b. Elastic
c. Support for multiple platforms
d. Resource pooling and consolidation
e. Metered service
2. Explain that Figure 10-16 is an example of a cloud computing model.
Teaching
Tip
Students may find more information various cloud services from Amazon at
http://aws.amazon.com/ec2/.
Quick Quiz 2
1. True or False: Many remote access methods exist, and they vary according to the type
of transmission technology, clients, hosts, and software they can or must use.
Answer: True
2. True or False: Traditional dial-up networking can provide the quality required by many
network applications.
Answer: False
3. ____________________ transmission was designed for communication that happens at
random intervals, such as sending the keystrokes of a person typing on a remote
keyboard.
Answer: Asynchronous
4. True or False: Many types of remote virtual computing software exist, and they differ
significantly in their capabilities, security mechanisms, and supported platforms.
Answer: False
5. Two important considerations when designing a VPN are _____ and security.
a. reliability
b. interoperability
c. availability
d. performance
Answer: B
Network+ Guide to Networks, 6th Edition
10-9
Class Discussion Topics
1. Discuss the benefits of cloud computing.
2. Discuss why an organization would want to develop an enterprise-wide approach to
remote access via VPNs.
Additional Projects
1. Have the student research the available cloud computing services offering infrastructure
services. Students should be sure to use the common features of a cloud computing
platform to ensure that the service they are reporting on is a cloud computing service
according to the text.
2. Have students research policies and procedures at several organizations surrounding
either cloud computing or remote access, including remote desktops. Students may also
want to research the controversy surrounding companies that want to provide these
services commercially for certain popular applications, like Microsoft Office, in the
context of what they learn from their policy and procedure research.
Additional Resources
1. OpenVPN
http://openvpn.net/
2. PPP and PPPoE
http://whatismyipaddress.com/ppp-pppoe
3. PPTP (RFC2637)
http://www.ietf.org/rfc/rfc2637.txt
4. Remote Desktop Protocol
http://msdn.microsoft.com/en-us/library/windows/desktop/aa383015(v=vs.85).aspx
5. RFB (VNC) Protocol
http://www.realvnc.com/docs/rfbproto.pdf
Network+ Guide to Networks, 6th Edition
10-10
Key Terms
 Anything as a Service See XaaS.
 authentication The process of comparing and matching a client’s credentials with the
credentials in the NOS user database to enable the client to log on to the network.
 client-to-site VPN A type of VPN in which clients, servers, and other hosts establish
tunnels with a private network using a remote access server or VPN gateway. Each
client on a client-to-site VPN must run VPN software to create the tunnel for, and
encrypt and encapsulate data.
 cloud computing The flexible provision of data storage, applications, or services to
multiple clients over a network. Cloud computing consolidates resources and is elastic,
metered, self-service, multiplatform, and available on demand.
 credentials A user’s unique identifying characteristics that enable him to authenticate
with a server and gain access to network resources. The most common credentials are a
username and a password.
 dial-up networking The process of dialing into a remote access server to connect with
a network, be it private or public.
 elastic A characteristic of cloud computing that means services can be quickly and
dynamically—sometimes even automatically—scaled up or down.
 Everything as a Service See XaaS.
 guest In the context of virtualization, a virtual machine operated and managed by a
virtualization program.
 host In the context of virtualization, the physical computer on which virtualization
software operates and manages guests.
 Hyper-V Microsoft’s virtualization software package. Hyper-V operates with Windows
Server 2008 and Windows Server 2008 R2.
 hypervisor The element of virtualization software that manages multiple guest
machines and their connections to the host (and by association, to a physical network).
A hypervisor is also known as a virtual machine manager.
 ICA (Independent Computing Architecture) The software from Citrix Systems, Inc.,
that, when installed on a client, enables the client to connect with a host computer and
exchange keystrokes, mouse clicks, and screen updates. Citrix’s ICA client can work
with virtually any operating system or application.
 Kernel-based Virtual Machine See KVM.
 KVM (Kernel-based Virtual Machine) An open source virtualization package
designed for use with Linux systems.
 L2TP (Layer 2 Tunneling Protocol) A protocol that encapsulates PPP data, for use on
VPNs. L2TP is based on Cisco technology and is standardized by the IETF. It is
distinguished by its compatibility among different manufacturers’ equipment; its ability
to connect between clients, routers, and servers alike; and also by the fact that it can
connect nodes belonging to different Layer 3 networks.
 Layer 2 Tunneling Protocol See L2TP.
 multitenant A feature of cloud computing in which multiple customers share storage
locations or services without knowing it.
 NaaS (Network as a Service) A type of cloud computing that offers clients a complete
set of networking services—for example, mail, Web, DNS, DHCP, and remote access
services, plus LAN and WAN connectivity.
 Network as a Service See NaaS.
Network+ Guide to Networks, 6th Edition
10-11
 open source The term that describes software whose code is publicly available for use
and modification.
 Point-to-Point Protocol See PPP.
 Point-to-Point Protocol over Ethernet See PPPoE.
 Point-to-Point Tunneling Protocol See PPTP.
 PPP (Point-to-Point Protocol) A communications protocol that enables a workstation
to connect to a server using a serial connection. PPP can support multiple Network layer
protocols and can use both asynchronous and synchronous communications. It performs
compression and error correction and requires little configuration on the client
workstation.
 PPPoE (Point-to-Point Protocol over Ethernet) PPP running over an Ethernet
network.
 PPTP (Point-to-Point Tunneling Protocol) A Layer 2 protocol developed by
Microsoft that encapsulates PPP data for transmission over VPN connections. PPTP
operates with Windows RRAS access services and can accept connections from
multiple different clients. It is simple, but less secure than other modern tunneling
protocols.
 private cloud An arrangement in which shared and flexible data storage, applications,
or services are managed on and delivered via an organization’s internal network.
 public cloud An arrangement in which shared and flexible data storage, applications, or
services are managed centrally by service providers and delivered over public
transmission lines, such as the Internet. Rackspace and Amazon (with its EC2 offering)
are leading public cloud service providers.
 RAS (Remote Access Service) The dial-up networking software provided with
Microsoft Windows 95, 98, NT, and 2000 client operating systems. RAS requires
software installed on both the client and server, a server configured to accept incoming
clients, and a client with sufficient privileges (including username and password) on the
server to access its resources. In more recent versions of Windows, RAS has been
incorporated into the RRAS (Routing and Remote Access Service).
 RDP (Remote Desktop Protocol) An Application layer protocol that uses TCP/IP to
transmit graphics and text quickly over a remote client-host connection. RDP also
carries session, licensing, and encryption information.
 remote access A method for connecting and logging on to a LAN from a workstation
that is remote, or not physically connected, to the LAN.
 Remote Access Service See RAS.
 Remote Desktop A feature of Windows operating systems that allows a computer to
act as a remote host and be controlled from a client running another Windows operating
system.
 Remote Desktop Protocol See RDP.
 Routing and Remote Access Service (RRAS) The software included with Windows
operating systems that enables a server to act as a router, firewall, and remote access
server. Using RRAS, a server can provide network access to multiple remote clients.
 RRAS See Routing and Remote Access Service.
 Serial Line Internet Protocol See SLIP.
 site-to-site VPN A type of VPN in which VPN gateways at multiple sites encrypt and
encapsulate data to exchange over a tunnel with other VPN gateways. Meanwhile,
clients, servers, and other hosts on a site-to-site VPN communicate with the VPN
gateway.
Network+ Guide to Networks, 6th Edition
10-12
 SLIP (Serial Line Internet Protocol) A communications protocol that enables a
workstation to connect to a server using a serial connection. SLIP can support only
asynchronous communications and IP traffic and requires some configuration on the
client workstation. SLIP has been made obsolete by PPP.
 thin client A client that relies on another host for the majority of processing and hard
disk resources necessary to run applications and share files over the network.
 tunnel A secured, virtual connection between two nodes on a VPN.
 tunneling The process of encapsulating one type of protocol in another. Tunneling is
the way in which higher-layer data is transported over VPNs by Layer 2 protocols.
 virtual adapter See vNIC.
 virtual appliance An image that includes the appropriate operating system, software,
hardware specifications, and application configuration necessary for a prepackaged
solution to run properly on a virtual machine.
 virtual bridge An interface connecting a vNIC with a virtual or physical network, or a
port on a virtual switch.
 virtual desktop A desktop operating environment that is hosted virtually, on a different
physical computer from the one the user interacts with.
 virtual machine See VM.
 virtual machine manager See hypervisor.
 Virtual Network Computing See VNC.
 virtual network interface card See vNIC.
 virtual private network See VPN.
 virtual server A server that exists as a virtual machine, created and managed by
virtualization software on a host, or physical, computer.
 virtual switch A logically defined device that is created and managed by virtualization
software and that operates at the Data Link layer. Ports on a virtual switch connect
virtual machines with a network, whether virtual or physical, through the host’s
physical NIC.
 virtual workstation A workstation that exists as a virtual machine, created and
managed by virtualization software on a host, or physical, computer.
 VirtualBox A virtualization software platform from Oracle.
 virtualization The emulation of a computer, operating system environment, or
application on a physical system.
 VM (virtual machine) A computer that exists in emulation on a physical computer, or
host machine. Multiple VMs may exist on one host where they share the physical
computer’s CPU, hard disk, memory, and network interfaces.
 VMware A vendor that supplies the most popular types of workstation and server
virtualization software. Used casually, the term VMware may also refer to the
virtualization software distributed by the company.
 VNC (Virtual Network Computing) An open source system that enables a remote
client (or viewer) workstation to manipulate and receive screen updates from a host.
Examples of VNC software include RealVNC, TightVNC, and UltraVNC.
 vNIC (virtual network interface card) A logically defined network interface
associated with a virtual machine.
Network+ Guide to Networks, 6th Edition
10-13
 VPN (virtual private network) A logically constructed WAN that uses existing public
transmission systems. VPNs can be created through the use of software or combined
software and hardware solutions. This type of network allows an organization to carve
out a private WAN through the Internet, serving only its offices, while keeping the data
secure and isolated from other (public) traffic.
 XaaS (Anything as a Service, or Everything as a Service) A type of cloud computing
in which the cloud assumes functions beyond networking, including, for example,
monitoring, storage, applications, and virtual desktops.
 Xen An open source virtualization software platform from Citrix Systems.
Download