Join Greg Sowell for an in-depth discussion in this video Firewall advanced features, part of Foundations of Networking: Network Media (WANs).
- View Offline
- Firewalls often have many features and options…that are above and beyond just filtering traffic.…Firewalls are usually a better option…for user VPN concentration as well.…They usually contain more tools and methods…to terminate high volumes of user VPN connections.…Often, complex criteria…like differing windows active directory groups…can be matched for user placement.…LAN to LAN tunnel termination…or those connecting two disparate networks…is often easily configured on firewalls,…but due to a firewall's inability to flexibly route traffic,…routers may be a better option in a complex environment.…
Due to the ever increasing complexity of modern firewalls,…graphical user interfaces have become more sophisticated.…Cisco's TAC says the official configuration method…for their firewalls is via their ASDM GUI,…even though all configuration can still be done via CLI.…They state that far fewer mistakes are made,…troubleshooting time is decreased,…and monitoring is simplified via the GUI.…High-availability firewalls allow for nonstop redundancy.…
He discusses different WAN technologies and features such as speeds, spans, and price points—including inexpensive options such as VPN. He then covers switches (the devices that connect computers in your building) and routers (devices that control the transmission of network data). Along the way, Greg shows how to build private connections, implement free networking over the Internet, build switch networks, and overlay-routed networks. He'll also introduce different routing protocols, such as OPSF link-state routing and distance-vector routing with RIPv2, EIGRP, and BGP.
Note that this course maps to domains 1 and 2 of the Microsoft Technology Associate (MTA) Networking Fundamentals certification exam (98-366).
- Understanding the technology: from dial-up to VPNs
- Working with hubs, bridges, and switches
- Ensuring hardware redundancy
- Using switching types and MAC tables
- Preventing bridge loops with STP
- Routing with routing tables
- Using NAT
- Securing your switches and routers
- Setting up firewalls
- Working with different routing protocols: RIPv2, OSPF, EIGRP, and more