Book Image

Implementing Cisco Networking Solutions

By : Harpreet Singh
5 (1)
Book Image

Implementing Cisco Networking Solutions

5 (1)
By: Harpreet Singh

Overview of this book

Most enterprises use Cisco networking equipment to design and implement their networks. However, some networks outperform networks in other enterprises in terms of performance and meeting new business demands, because they were designed with a visionary approach. The book starts by describing the various stages in the network lifecycle and covers the plan, build, and operate phases. It covers topics that will help network engineers capture requirements, choose the right technology, design and implement the network, and finally manage and operate the network. It divides the overall network into its constituents depending upon functionality, and describe the technologies used and the design considerations for each functional area. The areas covered include the campus wired network, wireless access network, WAN choices, datacenter technologies, and security technologies. It also discusses the need to identify business-critical applications on the network, and how to prioritize these applications by deploying QoS on the network. Each topic provides the technology choices, and the scenario, involved in choosing each technology, and provides configuration guidelines for configuring and implementing solutions in enterprise networks.
Table of Contents (12 chapters)

Providing remote access to the DC

Organizations generally have remote users who are on the public internet, and are required to access the corporate resources while on the move. This requires the DC to be connected to the internet, and allow the access of the servers in the intranet to the end users.

Although the DC is directly connected to the internet and separate servers can be hosted in the DMZ to allow this access, this would not be secure, as these servers would then be exposed to the complete internet. Such access is provided by bringing the remote users on the internal networks through VPNs, and then treating them as a part of the internal networks. The remote access VPNs (RAVPNs) are created over IP networks, typically the internet infrastructure and are secured using IPSec. The VPNs are authenticated using the credentials of the users to ensure that only the authorized...