Ch26

12
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001 Chapter 26 VLANs and VPNs

description

 

Transcript of Ch26

Page 1: Ch26

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Chapter 26

VLANsandVPNs

Page 2: Ch26

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 26-1

A switch connecting three segments

Page 3: Ch26

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 26-2 A switch using VLAN software

Page 4: Ch26

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 26-3

Two switches in a backbone using VLAN

software

Page 5: Ch26

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 26-4Private network

Page 6: Ch26

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 26-5

Hybrid network

Page 7: Ch26

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 26-6Virtual private networks

Page 8: Ch26

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 26-7

VPN techniques

Page 9: Ch26

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 26-8

Authentication

Page 10: Ch26

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 26-9Encryption

Page 11: Ch26

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 26-10

Tunneling

Page 12: Ch26

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 26-11

Addressing in VPN