32
1 CONNECTING TO THE INTERNET Chapter 5

Chapter 5 PowerPoint

Embed Size (px)

Citation preview

Page 1: Chapter 5 PowerPoint

11

CONNECTING TO THE INTERNET

Chapter 5

Page 2: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 2

CHAPTER INTRODUCTION

List the types of routers used for Internet connections.

Describe the various WAN technologies used for Internet connections.

Understand the criteria used to select an ISP for a network Internet connection.

List the criteria for determining how much Internet bandwidth a network needs.

Determine the Internet access security requirements for a network.

Page 3: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 3

UNDERSTANDING INTERNET CONNECTIVITY ARCHITECTURE

Page 4: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 4

INTERNET ACCESS ROUTERS

Software Windows Server 2003

Any Microsoft operating system that supports ICS

Any operating system that provides firewall capabilities

Hardware Dedicated devices

Page 5: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 5

INTERNET CONNECTION TYPES

Dial-up modem

ISDN

CATV and DSL

Leased lines

Frame relay

Page 6: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 6

DIAL-UP MODEM CONNECTIONS

Maximum speed of 53 Kbps downstream, 33.6 Kbps upstream

Widely available

Requires standard phone line and modem

Inexpensive to implement and run

Page 7: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 7

ISDN

Dial-up technology

Requires specialized phone line and hardware

Available in two versions

BRI

128 Kbps

PRI

1.544 Mbps

Page 8: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 8

CATV AND DSL

CATV Available from cable TV providers.

Bandwidth varies depending on location and other users.

DSL Uses standard phone lines.

Consistent bandwidth.

Page 9: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 9

LEASED LINES

Always-on, high-speed digital connection

Requires special hardware, installation, and maintenance

Normally available in two variants

T-1 (also known as DS-1)

1.544 Mbps

T-3 (also known as DS-3)

44.736 Mbps

Page 10: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 10

FRAME RELAY

Still requires modem, leased line, or ISDN connection to ISP.

Allows you to more effectively manage ISP costs if they are charged on a usage basis.

Not all ISPs provide support for frame relay connections.

Page 11: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 11

INTERNET SERVICE PROVIDERS

Provide Internet access to business and residential customers

Provide related services such as web hosting, e-mail, and DNS server services

Organized into tiers depending on their proximity to the Internet backbone

Page 12: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 12

UNDERSTANDING ISP SERVICES

Multiple WAN support

IP addresses

DNS servers

E-mail services

Web hosting

Internet domain hosting

Page 13: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 13

DETERMINING INTERNET CONNECTIVITY REQUIREMENTS

How much bandwidth?

How many users?

What applications do the users need?

When is Internet bandwidth needed?

Where are the users located?

Page 14: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 14

HOW MUCH BANDWIDTH?

How many users will require Internet access at one time?

What applications will the users need?

When will the users need access to the Internet?

Where will the users be located?

How much incoming bandwidth will Internet servers require?

Page 15: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 15

HOW MANY USERS?

Not necessarily equivalent to the number of employees.

More accurate measure is how many computers, particularly in environments where computer systems may be shared.

Consider work habits such as employees working on a shift system.

Consider the type of Internet access required by different users.

Page 16: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 16

WHAT APPLICATIONS DO THE USERS NEED?

Some applications are more connection-intensive than others.

Consider implementing restrictions to limit the use of unauthorized or unnecessary applications.

Page 17: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 17

WHEN IS INTERNET BANDWIDTH NEEDED?

Daily schedule

Business model

Annual schedule

Page 18: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 18

WHERE ARE THE USERS LOCATED?

Influences placement of Internet connectivity solutions

Can have an effect on IP addressing schemes

Can have an effect on features such as NAT

Page 19: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 19

SECURING AND REGULATING INTERNET ACCESS

Most companies monitor Internet access by employees.

Some companies regulate what employees can access on the Internet.

Threats include viruses, information theft, and loss of productivity.

Page 20: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 20

DETERMINING INTERNET SECURITY REQUIREMENTS

Limiting applications

Limiting users

Regulating Internet access

Page 21: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 21

LIMITING APPLICATIONS

Using unregistered IP addresses through a firewall protects systems on the internal network from being contacted by systems on the Internet.

Port filtering can be used to prevent users from accessing applications from servers based on the TCP/IP port number.

Packet filters allow you to control what applications are accessible through the firewall or proxy server.

Page 22: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 22

LIMITING USERS

Two commonly implemented methods of limiting Internet access by users: Packet filtering

Authentication

Page 23: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 23

REGULATING INTERNET ACCESS

By using a software application like a proxy server, you can Monitor what users are accessing on the

Internet.

Identify excessive Internet use.

Block sites based on content.

Page 24: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 24

USING NETWORK ADDRESS TRANSLATION

Static NAT

Provides one-to-one translation between unregistered and registered IP addresses

Dynamic NAT

Provides many-to-many translation between unregistered and registered IP addresses

Masquerading NAT

Provides many-to-one translation between unregistered and registered IP addresses

Page 25: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 25

NAT SECURITY

Relies on basic methods and procedures to provide security

Is not a substitute for a full-featured firewall

Does not provide the capability to block based on traffic type

Does not protect against denial of service (DoS) attacks

Page 26: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 26

STATEFUL PACKET INSPECTION

Inspects the contents of each packet as it travels between interfaces running the stateful inspection software

Allows common threats to be identified and filtered

Provides ancillary services such as detailed logging

Page 27: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 27

PORT FORWARDING

Allows an internally hosted system to be accessed through NAT by an external system

Disguises the IP address of the internal system, which provides added security

Used to take advantage of features like load balancing and redirection

Page 28: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 28

USING A PROXY SERVER

Acts as an intermediary between client computers on a private network and servers on the Internet

Forwards all requests with the IP address of the proxy server external interface

Works only with specific client applications

Allows Internet access to be controlled and monitored

Page 29: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 29

USING MICROSOFT INTERNET SECURITY AND ACCELERATION SERVER 2000

Microsoft’s integrated proxy and firewall solution

Provides policy-based security

Requires users to authenticate before granting Internet access

Caches information retrieved from the Internet to improve performance

Page 30: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 30

SELECTING AN INTERNET ACCESS METHOD

NAT

Low security, low level of control

Proxy

High security, high level of control

Page 31: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 31

CHAPTER SUMMARY

Internet access routers can range from workstation computers to servers to dedicated hardware devices.

WAN technologies used to establish Internet connectivity include dial-up modems, ISDN, CATV, DSL, leased lines, and frame relay.

ISPs can provide a variety of services to business clients in addition to providing simple Internet access.

The Internet bandwidth needed by a network is based on the number of users and the types of applications they run.

Page 32: Chapter 5 PowerPoint

Chapter 5: CONNECTING TO THE INTERNET 32

CHAPTER SUMMARY (continued)

An Internet connection is a gateway that can work in both directions, enabling Internet users to access your private network as well as allowing your users Internet access.

Most NAT implementations today use masquerading, a technique that maps unregistered IP addresses to a single registered IP address combined with a port number.

Proxy server products have evolved to now include an array of firewall and access-control features that provide comprehensive Internet security for a private network.