Remote Access Network Management Kelly Given Allison Traina.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Enabling Secure Internet Access with ISA Server
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Computer networks Fundamentals of Information Technology Session 6.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
PC Anywhere By: Neil Meharu Jewel Libid Pete Ramirez Lynn Hy.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Remote Desktop Connection Techniques Wireless Communication Networks.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
RADIUS Server PAP & CHAP Protocols. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Virtual Private Network
Chapter 11: Dial-Up Connectivity in Remote Access Designs
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
1 Remote Access July 10, What we’ll cover Remote access to NCAR’s network Remote access to Servers, Routers, Switches.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Chapter 7: Using Windows Servers to Share Information.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 9: Novell NetWare
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11 SECURING COMMUNICATIONS Chapter 7. Chapter 7: SECURING COMMUNICATIONS2 CHAPTER OBJECTIVES  Explain how to secure remote connections.  Describe how.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
1 An Overview of Telecommunications Telecommunications: the electronic transmission of signals for communications Telecommunications medium: anything that.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Newsgroup World Wide Web (WWW) Conservation Over the Internet e.g.ICQ File Transfer Protocol (FTP) Includes 6 main services: Electronic Mail Remote.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Ch26 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
Chapter Eight Internetworking with Remote Access.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Chapter 7: Using Windows Servers
Microsoft Windows NT 4.0 Authentication Protocols
Configuring and Troubleshooting Routing and Remote Access
System Architecture & Hardware Configurations
Network+ Guide to Networks 6th Edition
Presentation transcript:

Remote Access Network Management Kelly Given Allison Traina

What is remote access?  Enables you to connect to your computer across the internet from virtually any computer, Pocket PC, or Smartphone.  Mouse and Keyboard control  Sound and printing  Access to files and software

Features  Supports multiple connections at the same time  Works through the firewalls and supports DHCP  Supports high screen resolutions and color depths  Remote shutdown, restart, & logoff capabilities

Terminal Services  Popular method for gaining remote access to Local Area Networks  Multiple remote computers can connect to terminal server on the LAN  Sends only keystrokes and mouse clicks  Receives screen updates from the host

Web Portals  Secure, Web-based interface for an application  Only need Internet Connection, Web browser software, and proper credentials to log on to the application

Virtual Private Networks  VPNs are wide area networks logically defined over public transmission systems.  Access to authorized users only  Convenient and relatively inexpensive WAN  Interoperability and security are important considerations when designing a VPN

Example of a VPN

Security  Data Stream Encryption  PAP Password Authentication Protocol  CHAP Challenge Handshake Authentication Protocol  RADIUS Remote Authentication Dial-In User Service

Data Stream Encryption  128-bit AES Encryption Ensures data is fully encrypted from end-to-end, including:  Screen Images  File Transfers  Keyboard and Mouse Input  Chat Text Encryption key is unique for each connection

PAP  Sends authentication request Usually user name and password  Compares credentials with user database  Not very secure Sends in clear text

CHAP  Encrypts user names and passwords for transmission  Requires 3 steps to complete the authentication process: Server sends ‘challenge’ Client adds password to ‘challenge’ and encrypts the new string Server compares string of characters

CHAP Advantages and Disadvantages  Advantages Password is never transmitted:  Alone  As clear text  Disadvantages Encrypted string of characters could be captured and decrypted  User name and password could be obtained

RADIUS  Used with dial-up networking connections Caller ID Verification  Specified phone number Callback Verification  Each user has a specific phone number  Server disconnects and calls user back at that number

Advantages of RADIUS  Direct connection between the user and the dial-up server No information is going across the public Internet  Example: user IDs and passwords  Protects against unauthorized users

Demonstration 

GoToMyPC Security Features  Blank out host computer screen while connected  Lock host keyboard and mouse  Lock host computer upon disconnection  Inactivity automatic logoff  Prominent notification when computer is being accessed

Software Downloads  Remote Desktop- Microsoft  pcAnywhere- Symantec  – Free Trial  remotePC- Free Trial  – reviews and free downloads

Web Site 