Remote Networking Architectures

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Module 5: Configuring Access for Remote Clients and Networks.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Remote Access Network Management Kelly Given Allison Traina.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networking Karlene R. Samuels COSC513.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Windows Server 2008 Chapter 9 Last Update
Chapter 11: Setting up a Virtual Private Network.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Remote Controller & Presenter Make education more efficiently
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Microsoft Windows NT 4.0 Authentication Protocols
Remote Access Lecture 2.
Virtual Private Network (VPN)
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Cengage Learning: Computer Networking from LANs to WANs
Designing IIS Security (IIS – Internet Information Service)
Virtual Private Networks (VPN)
Topic 12: Virtual Private Networks
Presentation transcript:

Remote Networking Architectures What is Remote Networking? Remote Access Networking Virtual Private Networks (VPN) Remote Control Computing

What is Remote Networking? A type of network communication that enable users to access resources that are not at their physical location. Internet Remote Computer Remote access server Network Resources

Remote Access Networking A type of network communication that enables a user to access a computer or network from a remote distance. Internet Client configured for remote access via the internet Server configured to receive remote access connections from the internet Client configured for direct dial-up access Server configured to receive dial-up connections

Remote Access Authentication Process Remote Access Server Remote Client Step 1 : A remote user initiates a session. Step 2 : The remote computer requests connection to a remote access server. Step 3 : The remote server acknowledges the connection. Step 4 : The client is requested to authenticate itself by using a remote authentication protocol. Step 5 : A connection is established between both computers by using the agreed-upon authentication protocol and credentials.

Protocols used in Remote Access Networking Point-to-Point Protocol (PPP) Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Remote Authentication Dial-In User Service (RADIUS) Terminal Access Controller Access Control System (TACACS) Diameter

Password Authentication Protocol An authentication method that sends clients IDs and passwords as clear text. Client identifies itself Server requests verification Client provides password

Challenge Handshake Authentication Protocol (CHAP) Process An authentication method that is used for encrypting clients’ IDs and passwords. Logon requested Challenge Response Logon accepted

The CHAP Process Step 1 : A remote client requests a connection to the remote access server. Step 2 : The remote server sends a challenge sequence, which is usually a random value. Step 3 : The remote client uses its password to encrypt the challenge sequence and sends the results to the server. Step 4 : The server verifies the response and allows access to resources.

Remote Authentication Dial-In User Service (RADIUS) Remote clients connect to dial-up servers Dial-up servers receive requests and pass credentials to RADIUS sever RADIUS server accepts and processes all authentication requests RADIUS server Dial-up servers configured as RADIUS clients Remote Clients

Tunneling A data-transport technique whereby a data packet from one protocol is transferred inside the frame or packet of another protocol. IP data unencapsulated Carrier protocol (IP) moves the data Internet Passenger protocol enters the network Passenger protocol leaves the network ISP IP data encapsulated

Virtual Private Networks (VPN) VPN endpoint Public network VPN endpoint VPN endpoint Private network Private network VPN endpoint VPN endpoint Private network

Types of Virtual Private Networks (VPN) Access Virtual Private Network Intranet Virtual Private Network Extranet Virtual Private Network

Access Virtual Private Network A type of VPN that provides remote access to single users via dial-up, ISDN, xDSL and cable modem connections. Internet ISP Remote client Main Office VPN router Provides hardware based VPN

Intranet Virtual Private Network A type of VPN that connects sections of network , such as remote offices tying into a corporate headquarters. Internet Provides hardware based VPN Intranet remote office VPN router ISP Intranet main office

Extranet Virtual Private Network A type of VPN that connects networks belonging to different companies for the purpose of sharing resources. Intranet main office VPN router Internet VPN router ISP ISP VPN router Intranet remote office Extranet partner office

Secure Socket Layer VPN (SSL VPN) A VPN format that works with a web browser. Encryption protocols Secure the data Tunneling protocols secure the path Internet T-1 CSU/DSU VPN server ISP Encryption protocols secure the data

Protocols used in Virtual Private Network Point-to-Point Tunneling Protocol (PPTP) Layer Two Tunneling Protocol (L2TP)

VPN Concentrator A device that allow users to use an encrypted tunnel to securely access a corporate or other network via the internet. Main Office VPN Concentrator Internet ISP ISP Branch Office Remote user Remote user

Remote Control Computing A type of network communication that uses special software package that enables a remote client to take over a host computer on the network, as well as run applications from a server. Host client should be a dedicated server Internet Remote client Host client

Protocols used in Remote Control Remote Desktop Protocol (RDP) Virtual Network Computing (VNC) ICA (Independent Computing Architecture) X Windows System

Benefits of Remote Control Computing Supports connection and communication of multiple devices. Provides enhanced security due to implementation of both basic and advanced encryption schemes. Provides Remote Desktop Connection for sever administration and maintenance. Provides a centralized system for application deployments and remote access to those applications.

Microsoft Windows Terminal Services A Client/Server system that enables multiple clients to run applications or manage a server remotely. Terminal Server Remote Clients

Web-Based Remote Access A type of network communication that provides remote access to services and data via web browsers. Remote user accesses applications via a web browser Internet Remote administrator manages application servers via a web browser Web servers host applications