Session 5 Tp 5


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Session 5 Tp 5

  1. 1. Session 5 Network Design with Routing
  2. 2. <ul><li>DNS servers convert web addresses to IP addresses. This process is called Name resolution </li></ul><ul><li>Reverse name resolution is the process of conversion of IP addresses to IP addresses </li></ul><ul><li>DNS servers accept iterative and recursive queries </li></ul><ul><li>A zone is a contiguous part of the DNS namespace </li></ul><ul><li>Resource records are part of zonal databases that contain web addresses and their equivalent IP address </li></ul><ul><li>Multiple DNS servers are useful for d ivision of load amongst various DNS servers </li></ul><ul><li>Active directory integrated zones secure the dynamically updated DNS zones automatically </li></ul>Review
  3. 3. Objectives <ul><li>Explain routing and its features </li></ul><ul><li>Explain Static and Dynamic Routing </li></ul><ul><li>Explain Routing Protocol Communications </li></ul><ul><li>Identify the requirements for a Routed Network Design </li></ul><ul><li>Identify methods to secure the Routed Network </li></ul><ul><li>Troubleshoot TCP/IP Routing </li></ul>
  4. 4. Designing a Routing Network <ul><li>Consider the following while designed a routing network: </li></ul><ul><ul><li>Determine the requirements of the network </li></ul></ul><ul><ul><li>Identify the features of the Routing and Remote Access (RRA) </li></ul></ul><ul><ul><li>Integrate RRA with other networking services </li></ul></ul><ul><ul><li>Locate the router </li></ul></ul><ul><ul><li>Decide the number of hosts </li></ul></ul><ul><ul><li>Identify the protocols supported </li></ul></ul><ul><ul><li>Identify security needs </li></ul></ul>
  5. 5. Routing and Remote Access Service (RRAS) <ul><li>Features of RRAS: </li></ul><ul><ul><li>Provides an invisible internal network to the Internet </li></ul></ul><ul><ul><li>Provides support for IP and IPX/SPX routing protocols </li></ul></ul><ul><ul><li>Prevents traffic from the internal network segments, the Internet, and other networks </li></ul></ul><ul><ul><li>Routing and Remote Access provides support for many protocols </li></ul></ul>
  6. 6. Choosing WAN Topology <ul><li>The different types of topologies are: </li></ul><ul><ul><li>Mesh Topology – Connects more than two sites </li></ul></ul><ul><ul><li>Ring Topology – Connects each site to its adjacent site to form a closed loop </li></ul></ul><ul><ul><li>Star Topology – Connects multiple WAN connections to a single site that acts like a hub </li></ul></ul>
  7. 7. Selecting WAN Technology <ul><li>The different types of technologies that a WAN connection can use to connect the Internet are: </li></ul><ul><ul><li>Leased Telephone Lines </li></ul></ul><ul><ul><li>Dial-on Demand Connections </li></ul></ul><ul><ul><li>Frame Relay </li></ul></ul><ul><ul><li>Virtual Private Network (VPN) </li></ul></ul>
  8. 8. Static Routing <ul><li>Decreases dynamic protocol traffic </li></ul><ul><li>Increases security by restricting the routing table information </li></ul><ul><li>Manual updates of routing tables becomes less time consuming </li></ul><ul><li>Information in the Routing table does not change often </li></ul><ul><li>Demand dial interface and a default route is added. </li></ul>
  9. 9. Dynamic Routing <ul><li>Helps routers to communicate with each other and share the information in their routing table </li></ul><ul><li>Helps routers to compensate if a router or WAN fails </li></ul><ul><li>Prevents the traffic from getting forwarded to the failed router instead it is passed from a different route </li></ul>
  10. 10. Routing Information Protocol (RIP) <ul><li>Automatic updates the routing table </li></ul><ul><li>Minimizes time spent on manual updating </li></ul><ul><li>Changes Routing table information continuously </li></ul><ul><li>Used by the other routers in the network </li></ul><ul><li>Creates auto static entries using Routing and Remote Access and Demand Dial </li></ul><ul><li>Used when the total number of routers is less than 14 </li></ul>
  11. 11. Securing the routed Network <ul><li>Measures to prevent unauthorized access: </li></ul><ul><ul><li>Identify the users who require remote access </li></ul></ul><ul><ul><li>Identify the levels of remote access for the users </li></ul></ul><ul><ul><li>Identify the applications to be used by the users </li></ul></ul>
  12. 12. Methods to Secure Remote Access <ul><li>Limiting Access Using Dial-in Properties - Sets the properties of individual accounts that users uses to connect to the network. </li></ul><ul><li>Authentication - Enables us to prevent unauthorized users from accessing the network. </li></ul>
  13. 13. Limiting Access Using Dial-in Properties <ul><li>Remote Access Permission (Dial-in or VPN) </li></ul><ul><ul><li>Allow Access </li></ul></ul><ul><ul><li>Deny Access </li></ul></ul><ul><ul><li>Control access through Remote Access Policy </li></ul></ul><ul><li>Verify Called ID </li></ul><ul><li>Callback Options </li></ul><ul><ul><li>No Callback </li></ul></ul><ul><ul><li>Set by Caller </li></ul></ul><ul><ul><li>Always Callback to </li></ul></ul><ul><li>Assign Static IP Address </li></ul><ul><li>Apply Static Routes </li></ul>
  14. 14. Authentication <ul><li>Authentication can be ensured using the following options of the Authentication Methods dialog box: </li></ul><ul><ul><li>Extensible authentication protocol </li></ul></ul><ul><ul><li>Microsoft encrypted authentication version 2 (MS-CHAP v2) </li></ul></ul><ul><ul><li>Microsoft encrypted authentication (MS-CHAP) </li></ul></ul><ul><ul><li>Encrypted authentication (CHAP) </li></ul></ul><ul><ul><li>Shiva Password Authentication Protocol (SPAP) </li></ul></ul><ul><ul><li>Unencrypted Password (PAP) </li></ul></ul><ul><ul><li>Allow remote systems to connect without authentication </li></ul></ul>
  15. 15. Troubleshooting TCP/IP Routing <ul><li>Windows operating system offers certain TCP/IP tools that enable to troubleshoot routing problems: </li></ul><ul><ul><li>Ping.exe - Checks the accessibility of an IP address </li></ul></ul><ul><ul><li>Tracert.exe - Enables us to trace the path of a packet from one computer to another </li></ul></ul><ul><ul><li>Pathping.exe - Locates router failure which completely disrupts communication </li></ul></ul>
  16. 16. Troubleshooting RRA Configuration <ul><li>Check whether the Routing and Remote Access service is functioning </li></ul><ul><li>Check whether routing is enabled </li></ul><ul><li>Check the TCP/IP configuration settings </li></ul><ul><li>Verify the IP addresses of the router interfaces </li></ul>
  17. 17. Summary <ul><li>Features offered by routing are </li></ul><ul><ul><li>Internal network invisibility </li></ul></ul><ul><ul><li>Existing network integration </li></ul></ul><ul><ul><li>Internet and internal network traffic restriction </li></ul></ul><ul><li>The different types of topologies are: </li></ul><ul><ul><li>Mesh Topology </li></ul></ul><ul><ul><li>Ring Topology </li></ul></ul><ul><ul><li>Star Topology </li></ul></ul><ul><li>The different types of WAN technologies are: </li></ul><ul><ul><li>Leased Telephone Lines </li></ul></ul><ul><ul><li>Dial-on Demand Connections </li></ul></ul><ul><ul><li>Frame Relay </li></ul></ul><ul><ul><li>Virtual Private Network (VPN) </li></ul></ul>
  18. 18. Summary Contd… <ul><li>Encryption and authentication add more security through Routing and Remote Access </li></ul><ul><li>Static and dynamic routing are the two types of routing strategies </li></ul><ul><li>Methods of authentication </li></ul><ul><ul><li>Extensible Authentication Protocol (EAP) </li></ul></ul><ul><ul><li>Microsoft Encrypted Authentication version 2 (Microsoft-CHAP v2) </li></ul></ul><ul><ul><li>Microsoft Encrypted Authentication (MS-CHAP) </li></ul></ul><ul><ul><li>Encrypted Authentication (CHAP) </li></ul></ul><ul><ul><li>Shiva Password Authentication Protocol (SPAP) </li></ul></ul><ul><ul><li>Unencrypted Password (PAP) </li></ul></ul><ul><ul><li>Allow Remote Systems to Connect Without Authentication </li></ul></ul>
  19. 19. Summary Contd… <ul><li>Windows operating system offers certain TCP/IP tools that enable to troubleshoot routing problems: </li></ul><ul><ul><li>Ping.exe </li></ul></ul><ul><ul><li>Tracert.exe </li></ul></ul><ul><ul><li>Pathping.exe </li></ul></ul>