Ch26
-
Upload
idris-usmani -
Category
Technology
-
view
104 -
download
1
description
Transcript of Ch26
![Page 1: Ch26](https://reader035.fdocuments.in/reader035/viewer/2022070303/549a3ae2b47959b51e8b4793/html5/thumbnails/1.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Chapter 26
VLANsandVPNs
![Page 2: Ch26](https://reader035.fdocuments.in/reader035/viewer/2022070303/549a3ae2b47959b51e8b4793/html5/thumbnails/2.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-1
A switch connecting three segments
![Page 3: Ch26](https://reader035.fdocuments.in/reader035/viewer/2022070303/549a3ae2b47959b51e8b4793/html5/thumbnails/3.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-2 A switch using VLAN software
![Page 4: Ch26](https://reader035.fdocuments.in/reader035/viewer/2022070303/549a3ae2b47959b51e8b4793/html5/thumbnails/4.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-3
Two switches in a backbone using VLAN
software
![Page 5: Ch26](https://reader035.fdocuments.in/reader035/viewer/2022070303/549a3ae2b47959b51e8b4793/html5/thumbnails/5.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-4Private network
![Page 6: Ch26](https://reader035.fdocuments.in/reader035/viewer/2022070303/549a3ae2b47959b51e8b4793/html5/thumbnails/6.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-5
Hybrid network
![Page 7: Ch26](https://reader035.fdocuments.in/reader035/viewer/2022070303/549a3ae2b47959b51e8b4793/html5/thumbnails/7.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-6Virtual private networks
![Page 8: Ch26](https://reader035.fdocuments.in/reader035/viewer/2022070303/549a3ae2b47959b51e8b4793/html5/thumbnails/8.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-7
VPN techniques
![Page 9: Ch26](https://reader035.fdocuments.in/reader035/viewer/2022070303/549a3ae2b47959b51e8b4793/html5/thumbnails/9.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-8
Authentication
![Page 10: Ch26](https://reader035.fdocuments.in/reader035/viewer/2022070303/549a3ae2b47959b51e8b4793/html5/thumbnails/10.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-9Encryption
![Page 11: Ch26](https://reader035.fdocuments.in/reader035/viewer/2022070303/549a3ae2b47959b51e8b4793/html5/thumbnails/11.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-10
Tunneling
![Page 12: Ch26](https://reader035.fdocuments.in/reader035/viewer/2022070303/549a3ae2b47959b51e8b4793/html5/thumbnails/12.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-11
Addressing in VPN