Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.

Slides:



Advertisements
Similar presentations
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
SCSC 455 Computer Security Virtual Private Network (VPN)
WAN Technologies Dial-up modem connections Cheap Slow
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
Windows 2000 Remote Access. Remote Access Overview With Windows 2000 remote access, remote access clients connect to remote access servers and are transparently.
Remote Networking Architectures
Point-to-Point Protocol (PPP) Security Connecting to remote access servers (RASs) PPP authentication PPP confidentiality Point-to-Point Tunneling Protocol.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
CHAPTER Other Network Protocols and Services. Other Network Protocols and Services DLC Network Monitor Agent Remote Access Service Services for Macintosh.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Guide to MCSE , Second Edition, Enhanced1 Objectives Understand remote access under Windows XP Configure various remote access connection types for.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
NORTEL NETWORKS CONFIDENTIAL CallPilot 150 Modem Access Jan 03, 2005 Version 1.5.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Windows Server 2008 Chapter 9 Last Update
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
Module 6: Configuring and Troubleshooting Routing and Remote Access
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Chapter Eight Internetworking with Remote Access.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks
Getting Connected to NGS while on the Road…
Module 9: Configuring Network Access
Virtual Private Network (VPN)
Microsoft Windows NT 4.0 Authentication Protocols
Examining Network Protocols
Virtual Private Network (VPN)
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Getting Connected to NGS while on the Road…
Chapter 12: Remote Access and Virtual Private Networks
Topic 12: Virtual Private Networks
Presentation transcript:

Module 11: Supporting Remote Users

Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication Protocols and Encryption Using Remote Desktop Storing User Names and Passwords to Facilitate Remote Connections

Lesson: Establishing Remote Access Connections Establishing Outbound Connections Exploring Hardware Options Creating a Direct Cable Connection Creating Dial-up and Broadband Connections Establishing a Remote Access Session Examining Data Transport Protocols Configuring Multilink Connections

Establishing Outbound Connections Internet Connections  Dial-up and broadband connections using a modem, ISDN line, cable modem, or DSL modem Connections to Private Networks  Dial-up or VPN connections Advanced Connections  Direct cable connections

Exploring Hardware Options PSTN ISDN Cable Modem PSTN ISDN Cable Modem X.25 Direct Connection X.25 Direct Connection

Creating a Direct Cable Connection Client Server

Creating Dial-up and Broadband Connections ISP ServerInternetClient Remote Access Server

Remote Access Protocols Local Area Network LAN Protocols Establishing a Remote Access Session Internet Remote Access Server Remote Access Client

Examining Data Transport Protocols LAN Protocols Remote Access Protocols Remote Access Server Remote Access Client PPP SLIP (client only) RAS (Microsoft) Remote Access Protocols TCP/IP NWLink LAN Protocols

Configuring Multilink Connections PPP Multilink with BAP Connection Switches on Demand PPP Multilink Remote Access Server A B A B C

Lesson: Connecting to Virtual Private Networks Examining Client Connections Configuring a Virtual Private Network Connection Configuring Virtual Private Network Protocols Configuring Inbound Connections

Configuring a VPN connection Configuring VPN protocols Configuring a VPN connection Configuring VPN protocols Examining Client Connections Windows 2000 or Windows Server™ 2003 Internet Adapter Intranet Adapter Corporate Intranet VPN Remote Access Client Internet Tunnel

Configuring a Virtual Private Network Connection

Configuring Virtual Private Network Protocols PPTP or L2TP PPTP Internetwork must be IP-based No header compression No tunnel authentication Built-in PPP encryption ClientServer L2TP Internetwork can be based on IP, frame relay, X.25, or ATM Header compression Tunnel authentication IPSec encryption Internet

Configuring Inbound Connections Configuring Devices Enabling VPN Connections Configuring User Permissions Choosing and Configuring Network Software

Lesson: Configuring Authentication Protocols and Encryption Standard Authentication Protocols Extensible Authentication Protocol Configuring Client Authentication Protocols Configuring Client Data Encryption

Standard Authentication Protocols ProtocolSecurityUse when PAP Low A client and server cannot negotiate using more secure validation SPAP Medium A Shiva client calls in to a server running Windows, or a Windows XP client calls in to a Shiva server CHAP High You have clients not running Microsoft operating systems MS-CHAP High You have clients running Windows NT Workstation 4.0 or later, or Microsoft Windows 95 or later MS-CHAP v2 High You have dial-up clients running Windows 2000 or later, or VPN clients running Windows NT 4.0 or Windows 98 or later

Extensible Authentication Protocol Allows the client and server to negotiate the authentication method that they will use Supports authentication by using  MD5-CHAP  Transport Layer Security  Additional non-Microsoft authentication methods Ensures support of future authentication methods through an API

Configuring Client Authentication Protocols

Configuring Client Data Encryption

Lab A: Configuring a VPN Connection Exercise: Configuring Inbound VPN Connections

Lesson: Using Remote Desktop Examining the Remote Desktop Feature Configuring Computers to Use Remote Desktop

Must be running Windows XP Must be configured to accept incoming connections Must be running Windows XP Must be configured to accept incoming connections Remote Desktop Must have Terminal Services client installed or configured to use Remote Desktop Local Desktop Examining the Remote Desktop Feature

Configuring Computers to Use Remote Desktop

Lab B: Configuring and Using Remote Desktop Exercise: Configuring Remote Desktop

Lesson: Storing User Names and Passwords to Facilitate Remote Connections Introduction to Stored User Names and Passwords to Facilitate Remote Connections Adding Credentials to Stored User Names and Passwords

Introduction to Stored User Names and Passwords to Facilitate Remote Connections Benefits of Stored User Names and Passwords  Users log on only once  Credentials are stored for later use  Credentials are portable Best practices  Use different passwords  Use strong passwords  Change passwords regularly  Use the This logon session only option

Adding Credentials to Stored User Names and Passwords

Lab C: Storing User Names and Passwords Exercise: Storing User Names and Passwords

Course Evaluation