Network+ Guide to Networks 6 th Edition

Similar documents
Network+ Guide to Networks 7 th Edition

Configuring PPP over Ethernet with NAT

Distributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013

Configuring PPP over Ethernet with NAT

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Citrix CloudPlatform (powered by Apache CloudStack) Version 4.5 Concepts Guide

1. Introduction Firewall contains SPI technique against intrusions, attacks and DOS

Vigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

Features. HDX WAN optimization. QoS

Cloud and Datacenter Networking

G806+H3C WSR realize VPN networking

EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE

Viewing Network Status, page 116. Configuring IPv4 or IPv6 Routing, page 116. Configuring the WAN, page 122. Configuring a VLAN, page 137

SoHo 401 VPN. Shared Broadband Internet Access VPN Gateway 3-Port Switching Hub, DMZ Port. Quick Install Guide

ElasterStack 3.2 User Administration Guide - Advanced Zone

Wireless-G Router User s Guide

Paperspace. Architecture Overview. 20 Jay St. Suite 312 Brooklyn, NY Technical Whitepaper

FAQ Guide. i-mo 310 & 540 Series Bonding Routers. FAQ Guide. for the i-mo 310 & 540 Series Appliances

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server

DSL/CABLE ROUTER with PRINT SERVER

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Virtual Private Networks.

NBG-416N. Wireless N-lite Home Router. Default Login Details. IMPORTANT! READ CAREFULLY BEFORE USE.

User Manual DIR-615. Wireless Router with Built-in 4-port Switch

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

User Manual DIR-615. Wireless N 300 Home Router

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

DrayTek Vigor Technical Specifications. PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6. Redundancy. By WAN interfaces traffic volume

Setting Up Windows 2K VPN Connection Through The Symantec Raptor Firewall Firewall

Connecting the DI-804V Broadband Router to your network

VMware Overview VMware Infrastructure 3: Install and Configure Rev C Copyright 2007 VMware, Inc. All rights reserved.

FusionHub. Evaluation Guide. SpeedFusion Virtual Appliance. Version Peplink

Introduction to Virtualization. From NDG In partnership with VMware IT Academy

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Multi-Homing Broadband Router. User Manual

CtrlS Datacenters Placement Questions And Answers

MyCloud Computing Business computing in the cloud, ready to go in minutes

From Zero Touch Provisioning to Secure Business Intent

Broadband Router DC-202. User's Guide

WHITE PAPER Citrix Branch Repeater VPX and XenServer How to set up a self contained Branch Repeater VPX demo environment with WAN emulation.

G-4200 SMB PAC with built-in AAA

LevelOne Broadband Routers

L2F Case Study Overview

MIMO Wireless Broadband Route r User s Manual 1

CONTENTS IN DETAIL INTRODUCTION

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Wireless Broadband Router

Electrical and Telecommunications Engineering Technology_TCET3142/TC570 NEW YORK CITY COLLEGE OF TECHNOLOGY THE CITY UNIVERSITY OF NEW YORK

Guide to Vyatta Documentation

Guide to Vyatta Documentation

Wireless a CPE User Manual

CyberGuard SG User Manual

VIRTUAL CENTRAL LOCK

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0

FusionHub. SpeedFusion Virtual Appliance. Installation Guide Version Peplink

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

The Billion 8800NL R2 - All-In-One Bridge modem solution for the UK For use with a dedicated firewall

VPN2S. Handbook VPN VPN2S. Default Login Details. Firmware V1.12(ABLN.0)b9 Edition 1, 5/ LAN Port IP Address

SonicWALL TZ 150 Getting Started Guide

Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel...

802.11N Wireless Broadband Router

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

1V0-642.exam.30q.

Wireless b/g/n 150Mbps AP Router

Configuring PPP over ATM with NAT

Figure 4-6: The Router with the Internet Connection is connected through the Internet Port

E3-E4 CM TECHNICAL IT INFRASTRUCTURE

Network Services Internet VPN

CHAPTER 7 ADVANCED ADMINISTRATION PC

How to configure PPTP VPNs roadwarrior to gateway

Virtual private networks

MIKROTIK ROUTEROS LAB WITH VIRTUALIZATION TECHNOLOGIES YANGON, MYANMAR

CompTIA Network+ Course

Apache CloudStack CloudStack Administrator's Guide

Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel...

CloudStack Administration Guide

Configuration Guide TL-ER5120/TL-ER6020/TL-ER REV3.0.0

Computer to Network Connection

Ordering and deleting Single-node Trial for VMware vcenter Server on IBM Cloud instances

Entry Level Assessment Blueprint Computer Networking Fundamentals

Provisioning Broadband Aggregators Topics

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview

SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD. May 2012

Wanos on XenServer. Complete Lab Setup Guide

Exam Questions Demo Microsoft. Exam Questions

CyberGuard SG User Manual

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver

Gigabit SSL VPN Security Router

Microsoft Exam

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Configuration Example

Quick Installation Guide DIR-300NRU. Wireless Router with Built-in 4-port Switch

SD-WAN Transform Your Agency

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet.

ITRI Cloud OS: An End-to-End OpenStack Solution

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)

COPYRIGHTED MATERIAL. Index

Transcription:

Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access Objectives 1. Explain virtualization and identify characteristics of virtual network components 2. Create and configure virtual servers, adapters, and switches as part of a network 3. Describe techniques for incorporating virtual components in VLANs 4. Explain methods for remotely connecting to a network, including dial-up networking, virtual desktops, and thin clients 5. Discuss VPNs (virtual private networks) and the protocols they rely on 6. Identify the features and benefits of cloud computing and NaaS (Network as a Service) Network+ Guide to Networks, 6 th Edition 2 Chapter 10: Virtual Networks and Remote Access 1

Virtualization Emulation of a computer, operating system environment, or application: On a physical system Virtual machines (VMs) Virtual workstations Virtual servers Can be configured to use different types of: CPU Storage drive NIC Network+ Guide to Networks, 6 th Edition 3 Virtualization (cont d.) VM appears to user no different than physical computer: Running the same software Host Physical computer Guest Virtual machines Hypervisor Manages virtual machines Figure 10-1 Elements of virtualization Network+ Guide to Networks, 6 th Edition 4 Chapter 10: Virtual Networks and Remote Access 2

Virtualization (cont d.) Advantages of virtualization Efficient use of resources Cost and energy savings Fault and threat isolation Simple backups, recovery, and replication Disadvantages Compromised performance Increased complexity Increased licensing costs Single point of failure Virtual network Can be created to consist solely of virtual machines on a physical server Most networks combine physical and virtual elements Network+ Guide to Networks, 6 th Edition 5 Virtual Machines and Adapters Virtualization program Assigns VM s software and hardware characteristics Often easy to use, step-bystep wizard Operating system images Available for download online Or on disc from software vendors Network connection Requires virtual adapter (vnic) Figure 10-2 Specifying a VM s memory in VMware Figure 10-3 Customizing vnic properties in VMware Network+ Guide to Networks, 6th Edition 6 Chapter 10: Virtual Networks and Remote Access 3

Virtual Switches and Bridges Virtual bridge or switch Created when first VM s NIC is selected Connects VM with host Resides in RAM Virtual switch Logically defined device Operates at Data Link layer Passes frames between nodes Virtual bridge Connects vnics with a network Network+ Guide to Networks, 6th Edition 7 Figure 10-4 Virtual servers on a single host connected with a virtual switch Figure 10-5 Virtual switches exchanging traffic through routers Network+ Guide to Networks, 6 th Edition 8 Chapter 10: Virtual Networks and Remote Access 4

Network Connection Types Must identify networking mode vnic will use Frequently-used network connection types Bridged NAT Host-only Bridged vnic accesses physical network using host machine s NIC Obtains own IP address, default gateway, and netmask from DHCP server on physical LAN Network+ Guide to Networks, 6 th Edition 9 Figure 10-6 vnic accessing a network in bridged mode Network+ Guide to Networks, 6 th Edition 10 Chapter 10: Virtual Networks and Remote Access 5

Figure 10-7 Selecting the Bridged option for a vnic in VMware Network+ Guide to Networks, 6 th Edition 11 Network Connection Types (cont d.) NAT vnic relies on host to act as NAT device Obtains IP addressing information from host Virtualization software acts as a DHCP server Default network connection type in VMware, VirtualBox, and KVM Host-only VMs on one host can exchange data with each other and the host Cannot communicate with nodes beyond the host Never receive or transmit data with host s physical NIC Network+ Guide to Networks, 6 th Edition 12 Chapter 10: Virtual Networks and Remote Access 6

Figure 10-8 vnic accessing a network in NAT mode Network+ Guide to Networks, 6 th Edition 13 Figure 10-9 Selecting the NAT option for a vnic in VirtualBox Network+ Guide to Networks, 6 th Edition 14 Chapter 10: Virtual Networks and Remote Access 7

Figure 10-10 Host-only network configuration Network+ Guide to Networks, 6 th Edition 15 Virtual Appliances Alternative to test servers for new software Virtual appliance includes: Image of operating system, software, hardware specifications, and application configuration Most commonly virtual servers Popular functions Firewall E-mail solutions Network management Remote access Network+ Guide to Networks, 6 th Edition 16 Chapter 10: Virtual Networks and Remote Access 8

Virtual Networks and VLANs Virtual network Refers to how VMs connect with other virtual and physical network nodes Virtual network management Nearly identical to physical network management To add VMs to a physical VLAN: Modify virtual switch s configuration Steps vary for different virtualization programs Network+ Guide to Networks, 6 th Edition 17 Figure 10-11 Multiple virtual servers connected to multiple VLANs Network+ Guide to Networks, 6 th Edition 18 Chapter 10: Virtual Networks and Remote Access 9

Remote Access and Virtual Computing Remote access Allows user to connect with LAN or WAN in different geographical location Allows access to shared resources as any other client on LAN or WAN Requires transmission path and appropriate software Popular remote access techniques Dial-up networking Microsoft s Remote Access Service (RAS) Or Routing and Remote Access Service (RRAS) Virtual Private Networks Network+ Guide to Networks, 6 th Edition 19 Dial-Up Networking Dialing directly into private network s or ISP s remote access server Usually refers to connection using PSTN Remote access server attached to group of modems Client must run dial-up software After authentication, user allowed access Remote access server can serve multiple users Low throughput Less popular today Network+ Guide to Networks, 6 th Edition 20 Chapter 10: Virtual Networks and Remote Access 10

Remote Access Servers Accepts connections regardless of Internet connection type RRAS (Routing and Remote Access Service) Microsoft s remote access software Available with Server 2003, 2008, 2008 R2, XP, Vista, and 7 operating systems Enables server to act as a router Includes multiple security provisions Network+ Guide to Networks, 6 th Edition 21 Figure 10-12 Clients connecting with a remote access server Network+ Guide to Networks, 6 th Edition 22 Chapter 10: Virtual Networks and Remote Access 11

Remote Access Protocols SLIP (Serial Line Internet Protocol) Earlier and less sophisticated than PPP Can only carry IP packets Requires significant amount of setup Does not support data encryption Asynchronous transmission PPP (Point-to-Point Protocol) Known as PPPoE when used over Ethernet Standard for connecting home computers to ISP Via DSL or broadband cable Network+ Guide to Networks, 6 th Edition 23 Remote Virtual Computing Allows workstation to remotely access and control another workstation Host may allow clients a variety of privileges Can send keystrokes and mouse clicks to the host Receive screen output in return Thin client Workstation that uses such software to access LAN Requires very little hard disk space or processing power Network+ Guide to Networks, 6 th Edition 24 Chapter 10: Virtual Networks and Remote Access 12

Figure 10-13 Protocols used in a remote access Internet connection Network+ Guide to Networks, 6 th Edition 25 Remote Virtual Computing (cont d.) Advantages Simple to configure Runs over any connection type Single host can accept simultaneous connections from multiple clients Popular programs Microsoft Remote Desktop VNC (Virtual Network Computing) ICA (Independent Computing Architecture) Remote desktop Comes with Windows client and server operating systems VNC (Virtual Network Computing) Open source system ICA (Independent Computing Architecture) Citrix System s XenApp Can work with virtually any operating system or application Easy to use Network+ Guide to Networks, 6 th Edition 26 Chapter 10: Virtual Networks and Remote Access 13

VPNs (Virtual Private Networks) Logically defined networks over public transmission systems Isolated from other traffic on same public lines Requires inexpensive software Important considerations Interoperability Security Types Site-to-site Client-to-site Enterprise-wide VPN Can include elements of client-to-site and site-to-site models VPNs tailored to customer s distance, user, and bandwidth needs Two major types of tunneling protocols PPTP (Point-to-Point Tunneling Protocol) L2TP (Layer 2 Tunneling Protocol) Network+ Guide to Networks, 6 th Edition 27 Figure 10-14 Site-to-site VPN Network+ Guide to Networks, 6 th Edition 28 Chapter 10: Virtual Networks and Remote Access 14

Figure 10-15 Client-to-site VPN Network+ Guide to Networks, 6 th Edition 29 Internet frequently pictured as a cloud Cloud computing Flexible provision of data storage, applications, and services To multiple clients over a network Cloud computing distinguishing features Self-service and on-demand Elastic Supports multiple platforms Resource pooling and consolidation Metered service Cloud Computing Can provide virtual desktops Operating environments hosted virtually Different physical computer than one user interacts with NaaS (Network as a Service) Service provider offers customers complete set of networking services Types of delivery Public cloud Private cloud Network+ Guide to Networks, 6 th Edition 30 Chapter 10: Virtual Networks and Remote Access 15

Figure 10-16 Example of cloud computing Network+ Guide to Networks, 6 th Edition 31 Summary 1. Virtualization: emulation of a computer, operating system environment, or application on a physical system 2. VMs exist as files on physical computer s hard disk 3. Hypervisor software manages resource allocation and sharing among virtual machines 4. Virtual switch allows VMs to communicate with each other and with nodes on a physical LAN or WAN 5. Different methods of remote user access exist 6. Cloud computing provides storage, applications, or services over a network Network+ Guide to Networks, 6 th Edition 32 Chapter 10: Virtual Networks and Remote Access 16