REMOTE MANAGEMENT OF SYSTEM

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Ljubomir Ivaniš CPU d.o.o.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Fluffy’s Safe Right? If you want to limit a user’s functionality, don’t make them an administrator.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Guide to Network Defense and Countermeasures Second Edition
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
BMC Software confidential. BMC Performance Manager Will Brown.
Common Devices Used In Computer Networks
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
An Introduction to IBM Systems Director
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Computer Emergency Notification System (CENS)
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Microsoft Management Seminar Series SMS 2003 Change Management.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
VMware vSphere Configuration and Management v6
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Unit 2 Personal Cyber Security and Social Engineering Part 2.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
A Quick Tour of Ceedo Deliver environments to un-managed PCs.
Distributed Systems Architectures Chapter 12. Objectives  To explain the advantages and disadvantages of different distributed systems architectures.
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Chapter 1: Explore the Network
Instructor Materials Chapter 7: Network Evolution
CompTIA Security+ Study Guide (SY0-401)
Chapter 6: Securing the Cloud
Module 9: Configuring Network Access
Security Virtualization
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Working at a Small-to-Medium Business or ISP – Chapter 8
Implementing Network Access Protection
Securing the Network Perimeter with ISA 2004
Grid Computing.
MCSA VCE
CCNET Managed Services
Cloud Computing By P.Mahesh
Oracle Solaris Zones Study Purpose Only
GGF15 – Grids and Network Virtualization
CompTIA Security+ Study Guide (SY0-401)
Infrastructure, Data Center & Managed Services
Virtual Local Area Network
Network+ Guide to Networks 6th Edition
Unit 27: Network Operating Systems
Cloud Computing Dr. Sharad Saxena.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
An Introduction to Computer Networking
Goals Introduce the Windows Server 2003 family of operating systems
Cloud Security for Endpoints
Chapter 8: Monitoring the Network
Data collection methodology and NM paradigms
Xiuzhen Cheng Csci332 MAS Networks – Challenges and State-of-the-Art Research – Wireless Mesh Networks Xiuzhen Cheng
Chapter-6 Access Network Design.
IT Management Services Infrastructure Services
Presentation transcript:

REMOTE MANAGEMENT OF SYSTEM PRESENTED BY: UWALAKA EZE HARSHITH THUMMALAPALLY AMITH VAKKALAGADDA

INTRODUCTION:- A process where network administrators have remote control of systems allowing users with remote computers to create a logical connection to the internet. This process is possible by remote access which is a set of technologies which connects a computer out of range to the internet The system is overlooked by a user through SNMP which notifies him about various system based on Microsoft, Cisco etc which use the remote management model Microsoft operating system have sets of applications which enables remote access and security features that an administrator should need in his daily routing CISCO used remote management model by a software called Cisco Virtual Office which provided support for quality of service (QoS) for voice and video, and has flexible security options

COMPONENTS OF REMOTE NETWORKING MODEL:- The Microsoft and Cisco used the following components for efficient functioning. They are as follows Virtualization Platform (virtual computer systems, virtualization layer, and physical NICs) Attached Bridge Management Client Network Port Profile Database (NPPDB)

COMPONENTS OF REMOTE NETWORKING MODEL:-

VIRTUALIZATION PLATFORM:- Consists of emulators and hypervisors that emulate whole physical computer machine providing multiple virtual machines on one physical platform Allows in virtualized server isolation Virtual computer is an emulation of a computer system based on computer architectures providing functionality of a physical computer with specialized hardware, software, or both Platform virtualization refers to the creation of a virtual machine that acts like a real computer with an operating system

VIRTUALIZATION PLATFORM:- Software executed on these virtual machines is separated from the underlying hardware resources Network Interface Controller (NIC) – Computer hardware component that connects a computer to a computer network Modern NICs offer advanced features such as interrupt and DMA interfaces to the host processors, support for multiple receive and transmit queues, partitioning into multiple logical interfaces, and on-controller network traffic processing such as the TCP offload engine

ATTACHED BRIDGE:- A direct attachment of the virtual machine's NIC to the given physical interface of the host physical machine Packets whose destination is on the same host physical machine as where they originate from are directly delivered to the target device Both origin and destination devices need to be in bridged mode for direct delivery. If either one of them is in vepa mode, a VEPA capable bridge is required

MANAGEMENT CLIENT:- Delivers distributed endpoint management (mobile, laptop, desktop, and server), helping IT deliver great service to end-users while minimizing cost, maintaining compliance, and reducing security risks Make intelligent decisions knowing the current state of inventory Pass software audits with ease and manage your software entitlements – don’t over deploy and don’t over spend Reduce vulnerability and financial risk through endpoint compliance and automated software patching

MANAGEMENT CLIENT:- Automate system provisioning, application deployment, profile configuration from a single console Seamlessly drive endpoint troubleshooting and management from BMC service management solutions Must be available on-demand or on premises

NETWORK PORT PROFILE DATABASE (NPPDB):-

NETWORK PORT PROFILE DATABASE (NPPDB):- Refers to a set of networking attributes for virtual machine(s) • MAC address, VLAN, QoS… Describes a specific configuration of network infrastructure To which virtual machine gets connected to Establishes consistent configuration among the bridges

NETWORK PORT PROFILE DATABASE (NPPDB):- OVF – DMTF standard for packaging, distributing, and deploying VMs Network port profile XML schema and OVF provide an interoperable way of provisioning and deploying networks in virtualized Network Port Profile configuration is independent from OVF

SECURITY FEATURES OF MICROSOFT REMOTE ACCESS:- Microsoft remote access offers a wide range of security features including: Authentication and authorization Secure user authentication Extensible Authentication Protocol Data encryption Caller ID Remote access account lockout Remote access policy profile packet filtering Packet filtering for VPN remote access

SECURITY FEATURES OF CISCO REMOTE ACCESSING:- Cisco offers wide range of security features such as: 24x7 Threat Analysis and Management Log Collection and Event Correlation High Touch Management and Incident Support Net flow and Metadata Extraction Proactive Threat Hunting Full Packet Capture

PROBLEMS:- Due to technology advances associated with convergence, consolidation and centralisation across the ICT stack, networks have become increasingly important and complex COMPLEXITY :Disparate network elements from multiple vendors need to be managed, along with secure policies, application performance and service levels COST: Networking and communications costs are a perennial concern for organisations and one of the most important factors in implementing new services RESOURCING: technical expertise could be better used to progress business projects, rather than manage network monitoring and availability issues RELIABILITY: Critical business applications and processes are impacted by unpredictable network availability

CHALLENGES:- GREATER COMPLEXITY: Disparate network elements from multiple vendors need to be managed, along with secure policies, application performance and service levels RELIABILITY / PREDICTABILITY: Critical business applications and processes are impacted by unpredictable network availability COST MANAGEMENT: Networking and communications costs are a perennial concern for organisations and one of the most important factors in implementing new services

OTHER CHALLENGES:- Lack of common configuration information that may be referenced by the virtualization ecosystem management entities Disparity between the capabilities of embedded bridges in the virtualization hosts and the capabilities of bridges in the attached network Technologies such as WAN optimization voice/video over IP, WLAN Application based policy control have all become an important to network element which oversee the effectiveness on Remote Network Management Microsoft and Cisco offer various software and hardware tool to enable the effectiveness of an administrator

SOLUTIONS:- DEVICE AND VENDOR AGNOSTIC: A wide variety of networking products from different vendors such as Cisco®, Juniper®, Blue Coat®, Riverbed®, Adva™, IPFX®, F5® are added as technology evolves INCREASED AVAILABILITY: Greater network availability through 24x7 proactive monitoring and managed problem resolution by a team of networking specialists INFORMATION AT ALL TIMES: Near real time information on your network through our 24x7 customer accessible portal REDUCED COSTS: Reduce the cost of IT management and the total cost of ownership, allowing your in-house experts to focus on your core business activities

CONCLUSION:- We have discussed about: Introduction Components for efficient functioning of Remote Management Security Features of Microsoft and Cisco Remote Management Problems Challenges Solutions

QUESTIONS?

THANK YOU