Download presentation
Presentation is loading. Please wait.
Published byLewis Elliott Modified over 9 years ago
1
USING ROUTING & REMOTE ACCESS
2
When you have only 2 network sites, then only 1 topology is available in which you install a router on each site & connect the router using WAN link. WAN Routers
3
Mesh Topology (if more than 2 network sites) Fault tolerant Not practical if more than 3 sites
4
Ring Topology Easier to install & maintain More affordable Not fault tolerant Not efficient
5
Star Topology (for company with HQ & branches) A compromise between mesh & ring One site functions as hub connected all the others Fault tolerant Fast & efficient
6
Using Leased Lines Expensive to install & maintain Characteristics of leased lines; Persistent connection – stay connected even when you don’t use it. Permanent – between two sides (not portable) Using Dial-on-Demand connections Slower than leased lines but not persistent & not permanent
7
Using frame relay Consists of leased line linking the network site to the nearest point-of-presence (POP) Flexible & economical Using VPNs Practical for connection between distant locations Charges based on the distance
8
Using static routing Network administrators must manually create & modify the routing table entries. Advantage : enables routers to compensate for a failed router or WAN link. Disadvantage : more manual maintenance. Dynamic routing Uses specialized routing protocol to build & update the table entries automatically Advantage : less maintenance work Disadvantage : subject to failed router or WAN link.
9
Uses specialized protocols enabling routers to communicate & share their routing table information. When a router fails to transmit its routing table entries on schedule, the other routers will detect the absence & remove the failed router from its routing table, thus prevents the routers from forwarding it to the failed router.
10
Dynamic routing table will evaluate the relative efficiency of routes to a specific destination There may be several path to reach the same destination & its up to the router to use the most efficient one. Routing table include a numeric qualifier called metric On static routers – administrator manually enters the metric value
11
There are 2 protocols used in routing ; OSPF – Open Shortest Path First Only transmits routing table entries when there is a change in the mapping. Each OSPF router compiles a map of the network called link state database. RIP – Routing Information Protocol Repeatedly broadcast their routing tables
12
Metric value represents the number of hops between that computer & the destination used in RIP hop – passage through a router from one network to another. Distance vector is the most effective way to calculate speed, smaller number of hops = faster Latency – time it takes for a router to process a packet (usual reason for delay in the packet transmission.
13
Open Shortest Path First (OSPF) is called a link state routing because it calculates the hop distance using method called Dijkstra algorithm. Dijkstra algorithm uses multiply criteria to evaluate the efficiency of a route. Criteria include the link’s transmission speed and delays caused by network traffic congestion.
14
A technique that is designed to provide a more efficient method of one-to-many communication compared to broadcast & unicast. Unicast transmission – involves 2 systems only, a source & destination. Multicast use a single destination IP that identifies a group of systems on the network called host group. Uses class D which ranges from 224.0.1.0 to 238.255.255.255 because class D identifies an entire group of systems. To receive multicast traffic, the network interface adapters must support a special mode called multicast promiscuous mode.
15
Questions to address; Which users require remote access? Permit remote access by authenticating them during login process by using remote access policies to dictate the conditions that need to be meet. Do users require different level of remote access? Depending on users jobs specification & resources they need, use permissions to assign different level of remote access Do users need access to the internet? In cases where users need can be met by access to the remote server, try preventing them from accessing the entire network.
16
What applications must users run? Limit users to specific applications by creating packet filters that permits only traffic using specific protocols & port numbers onto the network.
17
Using properties of the individual accounts that clients use to connect to the network is the most basic method of securing access to your network! Security options on the properties tab (active directory) are as follows; Remote access permission Verify caller id Callback option
18
Most basic form of remote access security, & without it anyone can connect to your remote access server Authentication – exchange of username & password. Radius – a standard defining a service that provides authentication, authorization & accounting for remote access installations.
19
Characteristics of authentication protocol; Extensible Authentication Protocol (EAP) Microsoft Encrypted Authentication Version 2 (MS- CHAP v2) Microsoft Encrypted Authetication (MS-CHAP) Encrypted Authentication (CHAP) Shiva Password Authentication Protocol (SPAP) Unencrypted Password (PAP) Allow Remote Systems To Connect Without Authentication.
20
Ability to validate the configuration of remote client computers before granting access to the entire network. Delays full access to the private network until the configuration of a connecting remote computer has been examined & validated. When the user initiates a connection, the user is authenticated & assigned an IP. However the computer is placed in quarantine mode with limited network access. Administrator provides a script to be run in the client PC, when the script returns result that the computer complies with the network policies, only then a full access is granted.
21
Consists of 3 elements; Conditions – specific attributes that the policy uses to grant or deny authorization to a user. In cases where there is more than 1 condition, users must meet all before server grant access. Remote access permission – receive permission to access the remote network either by satisfying the conditions or an administrator granting them. Remote access profile – set of attributes associated with a remote access policy that the RRAS applies to a client once it has authenticated & authorized it
22
Consists of the following; A set of quarantine packet filters that restricts the traffic that can be sent to and from a quarantined remote access client. A quarantine session timer that restricts the amount of time & client can remain connected in quarantine mode before being disconnected.
23
Using ping.exe Ping followed by an IP address on the command line to test any TCP/IP systems connectivity with any other system. You may IP address successfully even when its not routing properly. These are initial troubleshooting efforts to test the routing following the manner; Ping the computer’s loopback address 127.0.0.1 to confirm that the TCP/IP client is installed & functioning Ping the computer’s own IP address to confirm that the routing table contains the appropriate entries.
24
Ping the IP address of another computer on the same LAN Ping the DNS name of another computer on the same LAN Ping the computer’s designated default gateway address Ping several computers on another network that are accessible through the default gateway
25
Using tracert.exe Enables you to view the path the packets take from one computer to a specific destination When you type tracert followed by IP address, then a list of hops to the destination will be displayed including the IP address and DNS names of each router along the way. An excellent tool for locating a malfunctioning router because it informs how far the packet have gotten so far, when it stops at one spot, you know the router following it is having problem.
26
Using pathping.exe Just like tracert but useful when you reach destination but experiencing data loss or transmission delays.
27
Possible causes of problem in Routing & Remote Access Server (RRAS) is that the server is not routing traffic To begin troubleshooting, start with obvious causes; Verify that the routing & remote access service is running Verify that the routing is enabled Check the TCP/IP configuration settings Check the IP addresses of the router interfaces
28
If RRAS is configured correctly, but still experiencing routing problem then its possible that the routing table do not have the information needed to route network traffic correctly. Static Routing ; Possibly someone might have accidentally deleted, omitted or mistyped table entries. (human error). Edit it back using Routing & Remote Access Control Console. Dynamic Routing Lack of proper entries in the routing table. 2 ways to rectify; Verify that the routing protocol is installed on all the participating routers Verify that the routing protocol is configured to use the correct interfaces.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.