Documentos de Académico
Documentos de Profesional
Documentos de Cultura
ACTIVIDAD DE EVALUACIÓN 01
UNIDAD DE TRABAJO Nº4: Redes seguras. VPN-Firewalls
Tipo: Ejercicio
Agrupamiento: grupo
Resultados de aprendizaje:
1. Configura routers, analizando su función en las redes de comunicaciones y utilizando instrucciones y comandos específicos.
3. Implementa el acceso a redes de área amplia (WAN), configurando los dispositivos de conexión.
4. Verifica la puesta en servicio de redes telemáticas, realizando medidas y aplicando criterios de certificación.
5. Aplica técnicas de seguridad de la red, identificando las amenazas más comunes y configurando los recursos del sistema para su
protección.
6. Mantiene redes telemáticas, aplicando procedimientos de medida o monitorización y relacionando las disfunciones o averías con
sus causas.
Criterios de evaluación:
1.a) Se ha identificado la función de los routers en las redes de datos.
1.d) Se ha elaborado el protocolo de arranque del router.
1.e) Se han utilizado diferentes modos de acceso y comandos básicos para configurar el router.
1.h) Se ha verificado la configuración del router.
6.a) Se han relacionado las averías con las tipologías y características de las redes.
6.b) Se ha aplicado el plan de mantenimiento preventivo.
6.c) Se han identificado síntomas de averías.
6.d) Se han monitorizado las redes telemáticas.
6.e) Se ha localizado el subsistema, equipo o elemento responsable de la disfunción.
6.f) Se ha restituido el funcionamiento siguiendo el protocolo de puesta en servicio.
6.g) Se han actualizado los históricos de averías y el programa de mantenimiento.
DESCRIPCIÓN
VPN tunnels or Virtual Private Network tunnels are a method of spanning diverse networks in a manner to
allow two network devices to communicate with one another as if they were on the same local area network.
Imagine if you will a crowded room full of noisy people with two people on opposite ends of the room that
need to communicate with each other. By stretching a pipe across the room and each person speaking into
or listening to the end of the pipe, the two would be able to communicate with each other in the noisy,
crowded room as if they were the only ones in the room.
This analogy roughly describes a VPN tunnel, where the two people
wanting to communicate are the tunnel end point hosts and the crowded,
noisy room is the public Internet. In an actual VPN tunnel, the traffic would
follow the same path as other traffic through the Internet, but would be
encapsulated or possibly encrypted. When the packet reaches its
destination at the remote end of the tunnel, it is unencrypted and sent to its
destination.
The most common use of VPN’s is for remote hosts to “dial in” to an office
network (Road Warrior), thereby allowing the remote device to reach office
resources such as printers or file servers as if it was located on the same
private local area network. The transport network becomes invisible to the
remote host and it operates as if it were only one hop away from the office,
even though there may be many router hops in between.
Tunnels are either Layer 2 or Layer 3 in design, that is, packets are either
carried through the tunnel by routing or by switching. PPtP or Point to Point Tunneling Protocol is one example of a Layer 3 tunnel
while EoIP is an example of a Layer 2 tunnel. With a Layer 3 tunnel, routers on the end points make the decision about which packets to
send across the tunnel but with Layer 2 tunnels, all packets are sent through the tunnel like a switch (unless there are Layer 2 filters in
CICLO FORMATIVO DE GRADO SUPERIOR - SISTEMAS DE TELECOMUNICACIONES E INFORMÁTICOS
REDES TELEMÁTICAS (RDT) I.E.S. LA GUANCHA
PPTP – The Point to Point Tunneling Protocol is supported in RouterOS as both client and server. The server would be suitable for a
central location and will support a mixture of Windows clients, Mac OSX clients, MikroTik routers, or any other standards based PPTP
client. This is also an easy tunnel to set up between two routers and is a Layer 3 tunnel.
L2TP – The Layer 2 Tunneling Protocol is also supported and the setup is exactly the same as PPTP.
EoIP – Ethernet over Internet Protocol is a Layer 2 tunnel and can be bridged to provide a quick and easy method of bridging two
networks together over the Internet at Layer 2, however it provides no encryption.
MPLS/VPLS – Multiprotocol Label Switching and Virtual Private LAN Service are powerful protocols that help you create complex and
scalable provider networks. By using some basic features of each we can create simple network tunnels.
PPPoE – Point to Point Tunneling Protocol over Ethernet is a Layer 3 protocol used by many service providers because of it’s ability
to restrict network access, use central authentication, and provide automatic provisioning of customers. It is by design a tunnel, but not
in the sense of a typical VPN tunnel like PPTP or L2TP in that is not used to “tunnel through” public networks. PPPoE supports a special
type of IP addressing called point-to-point addressing.
WireGuard - WireGuard® is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster,
simpler, leaner, and more useful than IPsec, while avoiding the massive headache. It intends to be considerably more performant than
OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for
many different circumstances. Initially released for the Linux
kernel, it is now cross-platform (Windows, macOS, BSD, iOS,
Android) and widely deployable.
Informe-Memoria
• Incluir en el informe memoria la configuración Mikrotik de todos los apartados anteriores.
OBJETIVOS
− Que el alumno/a consolide sus conocimientos sobre la instalación/configuración de router y sus servicios.
− Que el alumno/a se inicie en la instalación/configuración de comunicaciones seguras a través de PPTP.
− Desarrollar la iniciativa del alumnado, el trabajo en grupo, la autonomía y el uso de diferentes fuentes de
información.
MÉTODO DE DESARROLLO
1. Lectura y estudio de los apartados del manual indicados en la actividad
2. Realización de las tareas según el esquema de la actividad
3. Registro de todas las tareas realizadas para su inclusión en el informe-memoria.
4. Recogida y empaquetado de todo el material utilizado
RECURSOS
− Router Mikrotik RB750
− Conectar a una VPN en Windows (https://support.microsoft.com/es-es/windows/conectar-a-una-vpn-en-
windows-3d29aeb1-f497-f6b7-7633-115722c1009c)
− Mikrotik Wiki (http://wiki.mikrotik.com/wiki/Manual:Interface/PPTP#Site-to-Site_PPTP)
EVALUACIÓN