Time
11 hours
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Hello. Welcome back, Siskel Certified Design Associate Module six. License exploring free. I'm your instructor. Wait.
00:08
In the previous video we talked about on adjectives, line my third allergies. From this video, we will begin to introduce the M C connectivity Internet connectivity on VPN ever designed
00:22
Prius has been questioned. Which three models would typically utilize a public TV for abusing? Choose free
00:34
you comers,
00:35
Internet connectivity, Remote access VPN right? Those are neat, you know, public facing modules wrestling a month you are not.
00:46
Here's the topical discuss today. First of all, we discussed you know, the emcee types instead of the enterprise. Adam Audio. The main purpose of the M zis is to provide access the service is it through control and the isolation techniques
01:00
right? Firewalls are used to second end of the D. M. Z is by function Internet T M Z or remote access VPN DMC, for example. The embassies are typically segmented and controlled by a C. L's on state full firewalls to such as this, Cisco s a innovation and security controls such as virtual device, the contacts net
01:21
Proxima and this pleat rotting Deanna's can also be used in. Hence the levels of security. Right service is within. The D M Z is can be hosted on our physical or virtue appliances for locating and Dennis Interest.
01:34
DMC types included the following Internet E Emily These times over the emcee is to provide Internet facing service is that has Web email, Deanna's and e commerce and receipts for a corporate users on all customers. Remote acts of the V p m d M a T T m Z for network access by corporate users.
01:53
Bye SSL or AKI Psycho VPN sessions
01:57
side the side of a P M D m z the MD for ramosside or a branch office connectivity by the second week in tunnels as an alternative to private network Go one surveys
02:07
Call service is of the M C D M Z. To connect it to public call. Service is such as a AWS or eyes were via encrypted tunnels. Unified communications. The M C D M Z to host the UC service is that she has a voice. The media over the Internet security serves of the embassy
02:25
security base. The D M Z for service is that he has Web publication firewalls, wops,
02:31
intrusion Provisions, Service's I ps is email on your all feel during service sees this diagram. They picked the use of a firewall. The emcees were the access control entries in N Price Pash.
02:49
Internet connectivity options include a foreign do rotter do home to provide the highest level of the residency for Internet activity with full redundancy hardware links and Internet service providers. Single rotter Do Home
03:04
provides a good level of redundancy for Internet activity through the use of multiple links and a multiple Internet service providers
03:13
on a single rotter. Single home right provides the bare minimum for the Internet activity, providing no levels of a redundancy for the hardware links or Internet service provider. This diagram shows Internet activity options with different levels of a redundancy with disgust.
03:34
Because of central sights, higher user populations, they will normally have a higher Internet being way of the connectivity on a centralized the access control for the Internet traffic falls.
03:44
Although most the branch offices will have an Internet connection, many of them will still have their Internet traffic back halt over the one today central site where central lies. The access control can talker another Internet activity option for branches sites as to have their own direct engine at access.
04:04
But there are security challenges with a hearing to the same set of a security policies in place out of the centralized the site, even though the performance of the traffic flows is better with the director Internet access, there's a greater security risk before the impress due to more Internet connection points for Attackers to target
04:26
high availability for the Internet at once, you have decided on having to interact rodders each with a link to two different Internet service providers. It is a time to start thinking about the biological design. For the writers,
04:40
logical Internet age eight is like considerations, including the following. Use a public A B G p. A s number for a GDP. Connections to the I s Peace
04:49
Used provider and independent I p. Address space to a law for other bird ties. Man to both I s Peace. Receive the full or partial Internet routing cables to optimize the forwarding outbound
05:01
they use h s r p g l b p o r r i g p. Such as AARP or less pf internally.
05:13
Then now we talk about a V p s we can tied to the divided by application, including a falling right remote access V P. M.
05:21
Well, this time of the V cam. Corrections gave mobile users home users and a partner's activity to corporate Internets over the Internet. Users. A tactically connected remote, connected, remotely and cable honest land or free G for G W. Wet
05:38
remote access wiki is usually terminated on Cisco ASA appliances on it can be grouped together to form a little bodies in crossed arena Dedicated the emcee
05:47
or existing Cisco A. C s. A firewall right can be used in smaller organizations. Both SSL on the piece like protocols are supported with the remote access A VPN, but SSL is recommended
06:01
with a nice as L V P. And crying is I. Options include a food tunnel or straight tunnel, local land access or Web or any connected client
06:12
on authentication, magnetism on dhe and point assessments. All your force about a s, a appliance side the side of Ikea sighed a sigh. VPs over the Internet over now donated one transport for inter attacking sites, generally the remote size that uses their Internet connection
06:31
to establish the VPN connection back to the corporate haven't had in the office
06:36
Saturday aside, the PS can also use a Nike backbone provided by service provider the menus. The cases of her side of the savvy P s are for Primary one transport. Lower cost. I am sure as it went back up on a connecting to secure Cloud service is
06:53
yes, A six guys are anuses school ASR receivers. The routers are commonly used the first satisfied of GPS with P sec over J R E to support the deployment of the I D piece
07:05
External Week here.
07:08
This is another form of a scientist out of AP Infrastructure for business Partner is an activity that also uses it up Internet or a private infrastructure from network access. Keep in mind that it is important to have the security extra night, and I work policies to restrict the business partners access.
07:26
Technically, these times of our VPs
07:29
terminating a partner designed firewalled the limit terrorize the zone. D. M Z On this diagram shows a VPN examples for home users. Mobile users Asset of the Savvy P s
07:45
Question number one, which technology issued a company used to connect the branch office to headquarters via an Internet connection. Well, maintaining confidentiality out of the flexibility to run a routing protocol between the two locations. A jury over i p sick
08:01
p i p sec
08:03
c t u r e d I says all weepy, eh?
08:07
A journey over I p second give you like the security and a denim make a rotting particle I p sec only give you the
08:15
security
08:16
jury you and give you the routing protocol, right? As as all the kin doesn't support routing out. All right?
08:26
Hey,
08:28
because you never do on designing for remote worker which, to our technical requirements to choose to a best effort interactive and a little bottom traffic patterns bu connections to the enterprise ads using layer to one technologies. See, always own connection with the S away from R E S P
08:46
the voice anarchy Second can support
08:48
e high end security devices with a state full fire Will feel during after you are Monte Homing Thio. Yes, he is always all the boys in uh it is always on connection with ice Away from I s P is a voice Our peace I could be a pan support, right. These are
09:07
too technical requirements critically to remold workers.
09:11
In today's brief lecture, we discussed the Emily Connective, the Internet connectivity and BP, and never does
09:20
any questions feel free to contact me
09:22
otherwise are suing an extra video by from now.

Up Next

CCDA (Cisco Certified Design Associate)

In this CCDA training you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification.

Instructed By

Instructor Profile Image
Wayne Xing
Network Solutions Architect
Instructor