Join Greg Sowell for an in-depth discussion in this video Tunnels and VPN, part of Foundations of Networking: Network Media (WANs).
- [Voiceover] Tunnels in virtual private networks…can be used in several situations,…but the most common is to connect…one remote resource to another over the Internet.…Tunneling and VPNs can connect remote sites…in much the same way as an MPLS or point to point connection…but for a fraction of the cost.…Tunnels can carry nearly any kind of traffic…from standard file sharing, voice, video to data collection.…The term VPN and tunnel are often used interchangeably.…
VPN generally implies a secured connection…for remote users and between remote sites.…Tunnels are also most often thought of…as site to site connections,…or methods to connect two or more remote locations together.…VPNs often imply remote user connections…where employees working abroad…will have a secure way to connect back into the network.…No matter the type of tunneling protocol you use,…they all take your packet and encapsulate them at your side…and send them across a network,…at which point they are decapsulated on the far side.…
Think of encapsulation as taking a message and…
He discusses different WAN technologies and features such as speeds, spans, and price points—including inexpensive options such as VPN. He then covers switches (the devices that connect computers in your building) and routers (devices that control the transmission of network data). Along the way, Greg shows how to build private connections, implement free networking over the Internet, build switch networks, and overlay-routed networks. He'll also introduce different routing protocols, such as OPSF link-state routing and distance-vector routing with RIPv2, EIGRP, and BGP.
Note that this course maps to domains 1 and 2 of the Microsoft Technology Associate (MTA) Networking Fundamentals certification exam (98-366).
- Understanding the technology: from dial-up to VPNs
- Working with hubs, bridges, and switches
- Ensuring hardware redundancy
- Using switching types and MAC tables
- Preventing bridge loops with STP
- Routing with routing tables
- Using NAT
- Securing your switches and routers
- Setting up firewalls
- Working with different routing protocols: RIPv2, OSPF, EIGRP, and more
Skill Level Beginner
1. WAN Technologies
4. Routing Protocols
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.