Using WAN Technologies - Designing Remote Connectivity - Enterprise Network Design | Summary and Q&A
TL;DR
This video discusses various VAN technologies for remote connectivity in enterprise network design, including remote access, VPNs, and internet backup.
Key Insights
- 🖐️ VAN technologies play a crucial role in efficient remote connectivity for enterprise networks.
- 😘 VPNs offer flexibility, scalability, and lower costs compared to traditional connectivity options.
- ❓ Different VPN connectivity options, including overlay VPNs and VPDN, provide various benefits and deployment options.
Transcript
Read and summarize the transcript of this video on Glasp Reader (beta).
Questions & Answers
Q: What are some typical requirements for remote access network design?
Remote access network design must consider factors such as data link layer technologies, investment and operating costs, support for voice services, and the need for low to medium volume data transfer.
Q: What are the advantages of using VPNs for connectivity?
VPNs offer flexibility, scalability, and lower network configuration costs. They allow for quick setup over existing infrastructure, support remote access and extranet connectivity, and provide a secure connection with reduced ongoing costs.
Q: What are the different VPN connectivity options?
Overlay VPNs use virtual point-to-point links between customer sites. Virtual Private Dial-up Networks (VPDN) rely on ISP connectivity infrastructure. Peer-to-peer VPNs involve the provider actively participating in customer routing.
Q: How does the internet serve as a VAN backup?
Internet backup options include IP routing without constraints, which requires full cooperation with ISPs, and layer 3 tunneling with GRE and IP security. These methods provide alternative paths over the internet for failed VAN connections.
Summary & Key Takeaways
-
VAN technologies are essential for efficient and reliable remote connectivity in enterprise network design.
-
The lecture covers remote access design, VPN design, and backup strategies such as dial backup routing, permanent secondary VAN links, and shadow PVC.
-
The use of the internet as a VAN backup is also explored, including IP routing without constraints and layer 3 tunneling with GRE and IP security.