Remote Access Mark Nicolay Computing & Communications.

Slides:



Advertisements
Similar presentations
Students can gain access to and use programs offered on the computers in the Instructional Support labs via an online network.
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Information and Technology Services Customer Services.
Computing Resources at UCSF  School of Nursing Computer Lab - N735  Avg. 30 hrs./week, 2-week schedule on door  Staffed by Nursing students  Interactive.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
UNIVERSITY OF CALIFORNIA, RIVERSIDE COMPUTING AND COMMUNICATIONS “GETTING CONNECTED” Presented by: Josee Larochelle, Phyllis Bruce, Amber Jones, and Terri.
Filling the Gap Between Vendor & User Practice Denise Troll Covey Associate University Librarian, Carnegie Mellon DLF Forum, November 2002.
CU-VPN Status Campus-wide VPN Service March 21, 2007.
Computing Resources at UCSF  School of Nursing Computer Lab - N735 Avg. 30 hrs./week, 2-week schedule on door Staffed by Nursing students  Interactive.
Computer Network (MASQ/NAT/PROXY)
Remote Networking Architectures
Fermilab VPN Service What is a VPN ?.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
What is the UF VPN Client, and How Do I Use it? (for Windows XP/7/ 8 Users). Presented by the Course Reserves Unit, George A. Smathers Libraries
What is the UF VPN Client, and How Do I Use it? (for OS X users). Presented by the Course Reserves Unit, George A. Smathers Libraries
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Untangle and OpenVPN. ‏ What is OpenVPN? Allows secure remote connection Based on SSL Uses UDP 1194 Supports – Site to Site (hardware to hardware) – Site.
©2006 Academic Computing Services, NJIT ©2011 Academic Computing Services, NJIT Academic Computing Services Software Availability at NJIT.
Penn State University College Of Education Understanding College of Education Resources.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Introduction to ITS SU. What we will cover ? Why it is important to you ? Netid account Printing SUmail Public Labs SURA/VPN AirOrangeX Getting.
©2006 Academic Computing Services, NJIT ©2011 Academic Computing Services, NJIT Academic Computing Services Efficient Use of Computing at NJIT.
Chapter 7: Using Windows Servers to Share Information.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
Alabama Supercomputer Authority A partnership of … and.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Corporate Information Systems Delivery of Infrastructure IT Services.
+ Navigating Campus Technology Presented by Stephanie Jasmin.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
ICT Services for Postgraduate Students Information and Communications Technology July 2008.
GRUNIGEN MEDICAL LIBRARY. grunigen.lib.uci.edu.
NPS As ISP Warning:Much of this information such as dates and phone numbers is in flux This is if you want your own home page hosted by NPS not to be confused.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Ch CHAPTER The Internet and the Web Irfan A. Ilyas Lecture 23.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
Process Manual Using Your GL Account for Off-campus Access to the Internet By: Louisa Au May 5, 2003 English 393 Technical Writing.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Copyright © First Option 2008 First Option WebCheck The 1st Option in IT.
Library Research Sources at UGA. UGA Libraries  Comprised of the Main library, Science library, Student Learning Center and Research Facilities  3.7.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
Session 7 - Maintenance - contract and day-to-day Maintenance Support Presenter  Grenville Powell (Managing Director - of Shokaz Integrated Computing.
Information Technology Practical information for new faculty about information technology at Missouri S&T it.mst.edu Christopher Dew Director, IT Operations.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Click your mouse to continue. Connecting to the Internet To connect to the Internet, your computer must have: A Web browser, such as Microsoft Internet.
WISER: Remote access to databases and datasets This session will help you to set up access to Oxford online resources from your home computer. The session.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Abdullah Alshalan Garrett Drown Group #4 CSE591 - Virtualization and Cloud Computing.
1 Connecting to a Database Server. 2 We all have accounts, with a single database each, on a Microsoft SQL Server on the USF network: allman.forest.usf.edu.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
EZAccess User Guide. EZAccess is a web proxy server that allows authorized users to access IP-restricted electronic resources subscribed by UiTM library.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Connecting to Online Resources from Off-Campus
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Getting Connected to NGS while on the Road…
Online Canon Printer Support & Customer Services
PPPoE Internet Point to Point Protocol over Ethernet
Getting Connected to NGS while on the Road…
09/12/2018 Virtual Networks.
Connecting Remotely Winter 2014.
Presentation transcript:

Remote Access Mark Nicolay Computing & Communications

Remote Access What is Remote Access? What is Remote Access? Why do you need Remote Access? Why do you need Remote Access? Why do you need different types of Remote Access? Why do you need different types of Remote Access?

Remote Access A suite of services provided by C&C A suite of services provided by C&C Facilitates remote access to the campus internet and UCR electronic resources. Facilitates remote access to the campus internet and UCR electronic resources. VPN, RAS, Proxy, Wireless VPN, RAS, Proxy, Wireless

Using Remote Access Services and Getting Help Account Information: All of the Remote Access services (VPN, RAS, Proxy, Wireless) use the same username/password combination. Follow the instructions on the website or contact Terri McDonald in C&C.

Accessing Remote Access Services and Getting Help Help: For technical support installing software or actually using the services contact the C&C Help Desk UCR Tel Coordinator:

Proxy Server Allows off-campus users to gain remote access to online resources normally restricted to the UCR Campus. Allows off-campus users to gain remote access to online resources normally restricted to the UCR Campus. Your computer - no matter where it is - appears to be on the UCR network. Your computer - no matter where it is - appears to be on the UCR network. To use the Proxy server you need: UCR NetID account; Internet connection from home; Browser configured for Proxy server. To use the Proxy server you need: UCR NetID account; Internet connection from home; Browser configured for Proxy server.

RAS (Remote Access Server) Dial-up Internet Service Provider intended to meet the needs of faculty and librarians requiring off-campus access to electronic library resources. Dial-up Internet Service Provider intended to meet the needs of faculty and librarians requiring off-campus access to electronic library resources. The RAS server has 46 phone lines operating at a maximum data rate of 56Kbps; the server provides Internet and campus access similar to commercial ISPs such as Earthlink. The RAS server has 46 phone lines operating at a maximum data rate of 56Kbps; the server provides Internet and campus access similar to commercial ISPs such as Earthlink.

RAS (Remote Access Server) Connect time is limited to two (2) consecutive hours, after which the connection will be "dropped" and the connection will have to be re-established. Connect time is limited to two (2) consecutive hours, after which the connection will be "dropped" and the connection will have to be re-established. To use the RAS server you need: UCR NetID account; A dial-up connection on your remote computer. To use the RAS server you need: UCR NetID account; A dial-up connection on your remote computer.

VPN (Virtual Private Network) Virtual Private Network uses a secure “tunnel” to connect to the UCR network via Cisco hardware. Designed for wireless and off-campus ISP connections. Virtual Private Network uses a secure “tunnel” to connect to the UCR network via Cisco hardware. Designed for wireless and off-campus ISP connections. A Cisco client program (Win, OSX, Linux) is required to be installed on your remote computer. A Cisco client program (Win, OSX, Linux) is required to be installed on your remote computer.

VPN (Virtual Private Network) UCR VPN does not provide an internet connection from your home. You will need to connect to an ISP. UCR VPN does not provide an internet connection from your home. You will need to connect to an ISP. To use UCR VPN you need: UCR NetID and password; Cisco VPN Client; Internet connection from home To use UCR VPN you need: UCR NetID and password; Cisco VPN Client; Internet connection from home

Requirements for Remote Access UCR NetID VPN RAS Proxy Yes Internet Connection Yes YesYes Yes No Dial-Up No No Yes Software No* Yes No* *Configure your computer’s operating system

Remote Access Mark Nicolay Computing & Communications