ch26
Post on 24-Dec-2014
105 Views
Preview:
DESCRIPTION
TRANSCRIPT
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Chapter 26
VLANsandVPNs
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-1
A switch connecting three segments
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-2 A switch using VLAN software
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-3
Two switches in a backbone using VLAN
software
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-4Private network
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-5
Hybrid network
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-6Virtual private networks
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-7
VPN techniques
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-8
Authentication
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-9Encryption
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-10
Tunneling
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 26-11
Addressing in VPN
top related