The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Chapter 11 Assignment: VPNs
Please use your own word on this assignment
Since the textbook covered VPNs in chapter 7, which we skipped, we'll use this assignment as an
opportunity to learn a little more about VPNs. Before doing this, you should read the descriptions
of site-to-site and client-to-site VPNs from page 340.
Probably the four most common protocols (or collections of protocols) used to create VPNs are
PPTP, SSTP, IPsec and OpenVPN. All four of these are mentioned in the textbook, with varying
levels of detail. To answer all of the following questions, you'll also have to do some research
online.
I believe that the each of these questions only has one correct answer. If you are questioning
whether your answer is correct, you should provide the links to two sources where you found
your answer. If it is incorrect, but those two sources support your answer, I will give you credit.
Â
Question 1. Which of the four protocols provides the least security, and should really never be
used (but yet it still is!)?
Question 2. Which of the four protocols is open source?
Question 3. Which of the four protocols is the most complex to administer (for instance, it may
require opening certain ports on a firewall)?
Question 4. Which TWO of the four protocols use SSL, the same protocols used by HTTPS?
Question 5. Which ONE of the four protocols does not support site-to-site VPNs?
Question 6. In the spring of 2014, some encryption programs were found to have a vulnerability
that became known as Heartbleed.
Â
An attacker exploiting this vulnerability could learn the encryption key being used by the program. Which of the four was vulnerable to Heartbleed? (it has since been patched – the answer to this question is not the same as the answer to question 1).
Â
Chapter 11 Instructor CommentsUp until this week, we've dealt with technologies used within a LAN. But almost every LAN endsup connected to other networks, and that's the purpose of a WAN.You connect to other networks by First connecting to a network belonging to an internet serviceprovider (ISP). Through the ISP's network you can access the internet and you can connect toother LANs controlled by your organization – for instance, you can connect branch ofFices to amain ofFice.Connecting to the InternetWhen connecting to the internet, the technologies used by businesses are largely the same thatare available to residential users, though not all technologies are available in all locations. Whatmakes business service different is that businesses often purchase guaranteed bandwidth andmuch improved customer service.±or residential use, you internet services are unlikely to guarantee any minimum bandwidth.Advertised bandwidths are approximations at best and often represent the maximum available.You are almost always sharing bandwidth with your neighbors. And if something goes wrong, youaren't going to be a particularly high priority.But downtime for a business means lost productivity, lost sales, and lost customers. So they willoften pay signiFicantly more than residential users, but receive guaranteed service and responsivecustomer support.Note this is not true of all businesses. The business service that you see advertised withresidential service at a slight premium usually doesn't provide either of these beneFits, it may be arepackaging of residential service that provides additional email addresses and a domain name,for instance. The services I am referring to are usually sold completely separate from residentialservice.±or organizations that are serious about avoiding downtime, it is common to have two ISPs, sothat if one fails, the other can take over.Connecting two LANsThe other use for WAN connections is to connect two LANs, for instance, connecting a branchofFice to the main ofFice.Obviously, if both the branch ofFice and main ofFice are connected to the internet, they cancommunicate with each other across the internet. But the real goal of a connection between LANsis to make the two LANs function as if they are a single LAN.±or instance, IP addresses used in LANs are typically private IP addresses, such as 192.168.n.naddresses. ±or a device inside the branch ofFice LAN to communicate with a device inside themain ofFice LAN across the internet, Network Address Translation (NAT) is required on both ends
Attachments:
-----------