Presentation is loading. Please wait.

Presentation is loading. Please wait.

Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.

Similar presentations


Presentation on theme: "Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication."— Presentation transcript:

1 Module 11: Supporting Remote Users

2 Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication Protocols and Encryption Using Remote Desktop Storing User Names and Passwords to Facilitate Remote Connections

3 Lesson: Establishing Remote Access Connections Establishing Outbound Connections Exploring Hardware Options Creating a Direct Cable Connection Creating Dial-up and Broadband Connections Establishing a Remote Access Session Examining Data Transport Protocols Configuring Multilink Connections

4 Establishing Outbound Connections Internet Connections  Dial-up and broadband connections using a modem, ISDN line, cable modem, or DSL modem Connections to Private Networks  Dial-up or VPN connections Advanced Connections  Direct cable connections

5 Exploring Hardware Options PSTN ISDN Cable Modem PSTN ISDN Cable Modem X.25 Direct Connection X.25 Direct Connection

6 Creating a Direct Cable Connection Client Server

7 Creating Dial-up and Broadband Connections ISP ServerInternetClient Remote Access Server

8 Remote Access Protocols Local Area Network LAN Protocols Establishing a Remote Access Session Internet Remote Access Server Remote Access Client

9 Examining Data Transport Protocols LAN Protocols Remote Access Protocols Remote Access Server Remote Access Client PPP SLIP (client only) RAS (Microsoft) Remote Access Protocols TCP/IP NWLink LAN Protocols

10 Configuring Multilink Connections PPP Multilink with BAP Connection Switches on Demand PPP Multilink Remote Access Server A B A B C

11 Lesson: Connecting to Virtual Private Networks Examining Client Connections Configuring a Virtual Private Network Connection Configuring Virtual Private Network Protocols Configuring Inbound Connections

12 Configuring a VPN connection Configuring VPN protocols Configuring a VPN connection Configuring VPN protocols Examining Client Connections Windows 2000 or Windows Server™ 2003 Internet Adapter Intranet Adapter Corporate Intranet VPN Remote Access Client Internet Tunnel

13 Configuring a Virtual Private Network Connection

14 Configuring Virtual Private Network Protocols PPTP or L2TP PPTP Internetwork must be IP-based No header compression No tunnel authentication Built-in PPP encryption ClientServer L2TP Internetwork can be based on IP, frame relay, X.25, or ATM Header compression Tunnel authentication IPSec encryption Internet

15 Configuring Inbound Connections Configuring Devices Enabling VPN Connections Configuring User Permissions Choosing and Configuring Network Software

16 Lesson: Configuring Authentication Protocols and Encryption Standard Authentication Protocols Extensible Authentication Protocol Configuring Client Authentication Protocols Configuring Client Data Encryption

17 Standard Authentication Protocols ProtocolSecurityUse when PAP Low A client and server cannot negotiate using more secure validation SPAP Medium A Shiva client calls in to a server running Windows, or a Windows XP client calls in to a Shiva server CHAP High You have clients not running Microsoft operating systems MS-CHAP High You have clients running Windows NT Workstation 4.0 or later, or Microsoft Windows 95 or later MS-CHAP v2 High You have dial-up clients running Windows 2000 or later, or VPN clients running Windows NT 4.0 or Windows 98 or later

18 Extensible Authentication Protocol Allows the client and server to negotiate the authentication method that they will use Supports authentication by using  MD5-CHAP  Transport Layer Security  Additional non-Microsoft authentication methods Ensures support of future authentication methods through an API

19 Configuring Client Authentication Protocols

20 Configuring Client Data Encryption

21 Lab A: Configuring a VPN Connection Exercise: Configuring Inbound VPN Connections

22 Lesson: Using Remote Desktop Examining the Remote Desktop Feature Configuring Computers to Use Remote Desktop

23 Must be running Windows XP Must be configured to accept incoming connections Must be running Windows XP Must be configured to accept incoming connections Remote Desktop Must have Terminal Services client installed or configured to use Remote Desktop Local Desktop Examining the Remote Desktop Feature

24 Configuring Computers to Use Remote Desktop

25 Lab B: Configuring and Using Remote Desktop Exercise: Configuring Remote Desktop

26 Lesson: Storing User Names and Passwords to Facilitate Remote Connections Introduction to Stored User Names and Passwords to Facilitate Remote Connections Adding Credentials to Stored User Names and Passwords

27 Introduction to Stored User Names and Passwords to Facilitate Remote Connections Benefits of Stored User Names and Passwords  Users log on only once  Credentials are stored for later use  Credentials are portable Best practices  Use different passwords  Use strong passwords  Change passwords regularly  Use the This logon session only option

28 Adding Credentials to Stored User Names and Passwords

29 Lab C: Storing User Names and Passwords Exercise: Storing User Names and Passwords

30 Course Evaluation


Download ppt "Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication."

Similar presentations


Ads by Google