© Copyright 1997, The University of New Mexico D-1 Dialups Access for Remote Users via Telephone lines.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
1 Linux Networking and Security Chapter 2. 2 Configuring Basic Networking Describe how networking devices differ from other Linux devices Configure Linux.
WAN Technologies Dial-up modem connections Cheap Slow
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Networks Adapting Computers to Telecommunications Media.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
© Copyright 1997, The University of New Mexico C-1 Internet Service Provider Services What to do once you’re connected.
Lesson 7 – THE BUSINESS OF NETWORKING. TCP/IP and UDP Other Internet protocols Important Internet protocols OVERVIEW.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
© Copyright 1997, The University of New Mexico J-1 TCP/IP Integration AppleTalk Over TCP/IP Packets Carry IP and AppleTalk Addressing.
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
Remote Networking Architectures
Network Protocols and Standards (Part 1). Network Protocols Understanding the concepts of networking protocols is critical to being able to troubleshoot.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
WAN Networking Protocols 1 WAN Connection Types Share bandwidth Frame Relay and X.25 56Kbps to 2.048Mps Point-to-Point connection No setup before transmission.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
NORTEL NETWORKS CONFIDENTIAL CallPilot 150 Modem Access Jan 03, 2005 Version 1.5.
Windows Server 2008 Chapter 9 Last Update
1 Chapter Overview Understanding the Windows 2000 Networking Architecture Using Microsoft Management Console.
Ministry of Communications and Information Technology Information Technology Institute Network Fundamentals Introduction to Internet Lec2.
Networking Technologies
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
1 Understanding the TCP/IP Protocol Suite Industry standard Enables enterprise networking and connectivity.
1 Chapter Overview Installing the TCP/IP Protocols Configuring TCP/IP.
Section 11: Implementing Remote Connectivity CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 2: Configuring Network Protocols.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
Remote Access Service (RAS) Amir A. Khan Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran,
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
LAN Protocols Chapter 5. Learning Objectives Explain the following LAN protocols and how they work with network operating systems: IPX/SPX, NetBEUI, AppleTalk,
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to TCP/IP.
Windows Vista Configuration MCTS : Advanced Networking.
Getting Connected to NGS while on the Road…
Understand Wide Area Networks (WANs)
IPSec VPN Chapter 13 of Malik.
Examining Network Protocols
PPPoE Internet Point to Point Protocol over Ethernet
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Getting Connected to NGS while on the Road…
Presentation transcript:

© Copyright 1997, The University of New Mexico D-1 Dialups Access for Remote Users via Telephone lines

© Copyright 1997, The University of New Mexico D-2 Dialups Uses a remote node - typically a PC Requires phone lines, modems, and terminal servers Phone lines are typically set up in ‘hunt groups’ (a.k.a. phone rotors)

© Copyright 1997, The University of New Mexico D-3 Analog Uses standard phone lines and modems Limited to < 53 Kbps Line quality often limits throughput

© Copyright 1997, The University of New Mexico D-4 Digital ISDN, ADSL, etc. Requires Digital Lines and Service Requires Digital Modems at both ends

© Copyright 1997, The University of New Mexico D-5 ASCII Dial-in Services The remote node acts like (emulates) a ‘dumb’ terminal. Requires the remote node to run terminal emulation software: –Kermit, ProComm, HyperTerminal, etc. The terminal server provides telnet or other capabilities

© Copyright 1997, The University of New Mexico D-6 Dialup Networking (PPP and SLIP) The remote node acts like a locally-attached network node. Requires the remote node to run a TCP/IP stack –Winsock for windows 3.1 and 3.11 –Windows 95 or NT Dialup Networking –MacPPP or Apple OpenTransport

© Copyright 1997, The University of New Mexico D-7 PPP Point to Point Protocol Preferable to SLIP –Requires less setup and scripting –Negotiates MTU, IP address, subnet mask, default gateway

© Copyright 1997, The University of New Mexico D-8 Winsock Windows Sockets Standardized Interface to TCP/IP services

© Copyright 1997, The University of New Mexico D-9 Windows 95 Dialup Networking is PPP Treats Modem like any other network interface Applications don’t know the difference

© Copyright 1997, The University of New Mexico D-10 MacPPP Implements PPP on MacOSs

© Copyright 1997, The University of New Mexico D-11 Unices May require recompiling kernel or kernel extensions

© Copyright 1997, The University of New Mexico D-12 Protocols IP IPX NetBEUI Appletalk

© Copyright 1997, The University of New Mexico D-13 TCP/IP Internet Standard Protocol End node requires an IP address, subnet mask, gateway address, MTU

© Copyright 1997, The University of New Mexico D-14 IPX Novell Netware typically uses IPX packets, not IP packets End node needs a network number and network ID

© Copyright 1997, The University of New Mexico D-15 Appletalk Appletalk is used to access AppleShare disks and/or printers End node requires an Appletalk Zone

© Copyright 1997, The University of New Mexico D-16 Virtual Private Tunneling Networks Creates a private, encrypted network within a public network Packets are encrypted, then passed over public networks Encryption reduces the risk of ‘packet sniffing’ Primarily used on NT

© Copyright 1997, The University of New Mexico D-17 Capacity Currently one of the fastest-growing services Typical ‘prime time’ hours are 8:00 am to midnight Average ASCII session lasts < 20 minutes Average PPP session lasts > 40 minutes

© Copyright 1997, The University of New Mexico D-18 Time Limits A necessity unless you have unlimited resources (phone lines, modems, terminal servers) They are never popular They should be imposed from the beginning They are easier to relax than to tighten, so start conservatively

© Copyright 1997, The University of New Mexico D-19 Time Limits Some lines for very short sessions (< 10 minutes) to check The vast majority of sessions are under 2 hours. A few lines for very long or unlimited sessions (downloads, etc.) You can roll lesser service levels over to greater service levels

© Copyright 1997, The University of New Mexico D-20 Security Authorization - who is connected to you network –RADIUS Access Controls - Where can they connect to and what can they do –by network or per host A ‘must’ for PPP and SLIP A good idea for ASCII users

© Copyright 1997, The University of New Mexico D-21 Problem Determination Who is on? Is the user actually connected? Where are they connected? What protocol are they using? How is the connection configured?

© Copyright 1997, The University of New Mexico D-22 Accounting Important as an audit trail Begin and end date and time, user, line, protocol

© Copyright 1997, The University of New Mexico D-23 Routing Controls Without a route to a given destination set on the terminal server, clients cannot send packets to that network or system. If ASCII dial-in users are not authenticated, then they should not have routes to any unsecured systems, services, or the Internet

© Copyright 1997, The University of New Mexico D-24 Throughput Modem protocols above 14.4 Kbps include data compression, so compressible data gets a bigger apparent boost

© Copyright 1997, The University of New Mexico D-25 Line Quality Modems test the line quality and will ‘throttle down’ to a reliable speed Line quality involves several segments –End user’s lines to local switch –Inter-office trunk lines –Service Provider’s lines to local switch

© Copyright 1997, The University of New Mexico D-26 Telephone Switching Capacity Inter-office services - ‘trunk lines’ between local switching centers - are the most common bottleneck. The typical telephone switching center is designed for each phone to be in use an average of 3 minutes per hour at peak load. Widespread Internet access via dialups may require as much as 15 times the telephone switching capacity currently in place