Pages

Subscribe:

Monday, 21 January 2013

Implementation of security in WAN



Internet is composition of many network such as private, public, academic, business and government networks of local to global scope that are linked by the electronic and optical networking technologies.
The Internet carries a vast array of information resources and services. Many networking elements such as routers, switches, hubs etc. has been interconnected together for communication of data over the transmission media. The routers are connected with WAN interfaces through the serial ports for data transmission and forwarding the packets using routing tables where as switches and hubs are connected with LAN. Static routing tables and dynamic routing protocols tell the routers where to forward IP traffic. These routers mainly transfer the data traffic between networks without any filtration. The job of traffic filtering is best performed by Access Control Lists. Access list filters the traffic by restricting the packets are to be forwarded or to be blocked at the router’s interfaces. Router examines each packet and forward or discard the packet based on the information available in the access control list. Restriction of the traffic can be source I.P. address, Destination I.P. address and port numbers also. Finally, in the reports trainees has to give different commands on the router on various routing techniques and access lists to get the require results for connection establishment and troubleshooting of WAN interfaces and LAN networks.

0 comments:

Post a Comment

Contributors