Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.

Slides:



Advertisements
Similar presentations
Donald Hester May 11, 2010 For audio call Toll Free and use PIN/code Windows 7 for IT Professionals Part 2: Network and Sharing.
Advertisements

Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Module 5: Configuring Access for Remote Clients and Networks.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
At their deskAt their desk In a branchIn a branch On the roadOn the road Protect data & PCsProtect data & PCs Built on Windows Vista foundation Easy.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
Internet Protocol Security (IPSec)
Remote Networking Architectures
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Module 8 Configuring Mobile Computers and Remote Access in Windows 7.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Course 201 – Administration, Content Inspection and SSL VPN
Windows Server 2008 Chapter 9 Last Update
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Configuring Mobile Computing and Remote Access
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Microsoft DirectAccess & Work Folders NICHOLAS A. HAY MONROE COUNTY ISD
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
WSV Problem Background 3. Accelerated Protocols and Workloads 4. Deployment and Management 2. BranchCache Solution Modes 5. BranchCache Protocols.
Chapter Eight Internetworking with Remote Access.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
Windows Vista Configuration MCTS : Advanced Networking.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Network Access for Remote Networks
Securing the Network Perimeter with ISA 2004
Unit 27: Network Operating Systems
Utilize Group Policy Terminal Server Settings
Server-to-Client Remote Access and DirectAccess
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for Remote Access Configure DirectAccess for Remote Access Configure BranchCache for Remote Access

Tool Features Power Options Updated Battery Meter Power Plans Windows Mobility Center Key system settings collected in one place Display brightness, power plan, volume, wireless networking, external display settings, display orientation, and synchronization status Windows Mobile Device center Successor to Active Sync Synchronizes various content including music, video, contacts, calendar events, web browser favorites, and other files between Windows Mobile devices and Windows 7 Sync Center Sync data between desktop computers, network servers, and mobile devices Shows current status of all sync partnerships Presentation Settings Reconfigure your computer for a presentation One click changes multiple settings Presentation Settings Tools for Configuring Mobile Computer and Device Settings

Mobile Device Sync Partnerships update information about the mobile device and the host computer. What Are Mobile Device Sync Partnerships? Desktop Files sent to Mobile Device Mobile Device Files sent to Desktop Demo

Power PlanDescription Power Saver This plan saves power on a mobile computer by reducing system performance. Its primary purpose is to maximize battery life. High performance This plan provides the highest level of performance on a mobile computer by adapting processor speed to your work or activity and by maximizing system performance. Balanced This plan balances energy consumption and system performance by adapting the computer’s processor speed to your activity. Method for turning a computer on or off Data Storage State Power Needs Sleep or Standby System State Saved to Memory Low Hibernate System State Saved to Disk None Shut Down All Data Saved to Disk None Power Plans and Power-Saving Options in Windows 7 Demo

What Are Remote Desktop and Remote Assistance? Remote Desktop Remote Assistance A Windows 7 feature that enables users to connect to their desktop computer from another device Enables administrators to connect to multiple remote servers for administrative purposes A Windows 7 feature that enables users to connect to their desktop computer from another device Enables administrators to connect to multiple remote servers for administrative purposes A Windows 7 feature that enables support staff to connect to a remote desktop computer Optionally allows for remote control of that computer Assistance can be sought or offered A Windows 7 feature that enables support staff to connect to a remote desktop computer Optionally allows for remote control of that computer Assistance can be sought or offered

Configuring Remote Desktop includes setting it up on the remote computer and the host computer. Host Computer Launch the Remote Desktop Connection Choose Options to see the Remote Desktop configuration settings On the General Tab, enter the remote computer’s name and your authentication credentials Save your Connection Settings Select preferences on the remaining Option’s tabs Host Computer Launch the Remote Desktop Connection Choose Options to see the Remote Desktop configuration settings On the General Tab, enter the remote computer’s name and your authentication credentials Save your Connection Settings Select preferences on the remaining Option’s tabs Remote Computer Open the System Window Select Remote Settings In the System Properties Window select Allow Remote Assistance Under Remote Desktop select or add the users who can connect to this computer. Remote Computer Open the System Window Select Remote Settings In the System Properties Window select Allow Remote Assistance Under Remote Desktop select or add the users who can connect to this computer. Configuring Remote Desktop Demo

VPNs are point-to-point connections across a private or public network. A VPN client uses special protocols, called tunneling protocols, to make a virtual call to a virtual port on a VPN server What Is a VPN Connection? PPTP uses Point-to-Point Protocol (PPP) for user-level authentication and Microsoft Point-to-Point Encryption (MPPE) for encryption PPTP uses Point-to-Point Protocol (PPP) for user-level authentication and Microsoft Point-to-Point Encryption (MPPE) for encryption L2TP uses PPP authentication and IPsec encryption VPN connections use either Point-to-Point Tunneling Protocol (PPTP), Layer Two Tunneling Protocol/Internet Protocol security (L2TP/IPsec), or Secure Socket Tunneling Protocol (SSTP) SSTP uses PPP framing on top of Secure Sockets Layer (SSL)

Creating a VPN Connection Creating a VPN connection in the Windows 7 system environment requires authenticated access to a Windows a VPN Server  From the Network and Sharing Center- choose to the Setup a new connection wizard or type VPN at the Windows 7 search bar  Choose Connect to a workplace – Set up a dial-up or VPN connection Create a new connection  Select your VPN server after choosing Use my Internet Connection (VPN)

What Is DirectAccess? Features Provides users transparent access to internal network resources whenever they are connected to the Internet Enables IT Professionals to manage remote computers outside of the office Establishes a bi-directional connection that enables the client computer to remain current with company policies and to receive software updates Does not require a VPN connection Supports multifactor authentication methods Configurable to restrict which servers, users, and individual applications are accessible Provides users transparent access to internal network resources whenever they are connected to the Internet Enables IT Professionals to manage remote computers outside of the office Establishes a bi-directional connection that enables the client computer to remain current with company policies and to receive software updates Does not require a VPN connection Supports multifactor authentication methods Configurable to restrict which servers, users, and individual applications are accessible

How DirectAccess Works Selected ServerFull Enterprise Network Configured using DirectAccess console or IPsec policies IPsec session is established between the DirectAccess client and server IPsec is not used for communications across the internal network Enterprise internal security is unchanged Closely resembles VPN and can be more straightforward to deploy IPsec session is established between the DirectAccess client and server IPsec is not used for communications across the internal network Enterprise internal security is unchanged Closely resembles VPN and can be more straightforward to deploy Deploy IPv6 and IPsec in the organization Upgrade application servers Windows Server 2008 R2 Enable selected server access Allows end-to-end authentication and encryption from the DirectAccess client to internal resources Deploy IPv6 and IPsec in the organization Upgrade application servers Windows Server 2008 R2 Enable selected server access Allows end-to-end authentication and encryption from the DirectAccess client to internal resources Flexible configuration meets organizational security requirements

DirectAccess Requirements Requirements Deployment Requirements Deployment Windows Server 2008 R2 with two network adapters One domain controller and DNS server running Windows Server 2008 or Windows Server 2008 R2 Public Key Infrastructure (PKI) IPsec policies IPv6 transition technologies Windows 7 Enterprise on the client computers Optionally, a NAT-PT device to provide IPv4 access Windows Server 2008 R2 with two network adapters One domain controller and DNS server running Windows Server 2008 or Windows Server 2008 R2 Public Key Infrastructure (PKI) IPsec policies IPv6 transition technologies Windows 7 Enterprise on the client computers Optionally, a NAT-PT device to provide IPv4 access IPv6-over-IPsec to encrypt communications Scalability determined number of Direct Access servers Multiple ways to install Direct Access IPv6-over-IPsec to encrypt communications Scalability determined number of Direct Access servers Multiple ways to install Direct Access

BranchCache caches content from remote and Web servers in the branch location so users can quickly access the content. Cache can be hosted centrally in the branch location or distributed across user PCs. What Is BranchCache? Key benefits for IT professionals Remains transparent to the user Optimizes traffic flow between clients and servers Supports commonly used network protocols Supports end-to-end encryption between clients and servers Provides compatibility with end-to-end security protocols Helps reduce WAN link utilization

Distributed Cache Mode  Cache is distributed across client computers  Additional client computers retrieve content from the first requesting client computer  Beneficial for branch offices that do not have a local server with Windows Server 2008 R2 Hosted Cache Mode  Cache is on a server at the branch office  Client computers retrieve content from the branch office server  Beneficial for larger branch offices that have hardware resources for a local server with Windows Server 2008 R2 Client computers are configured to use only one caching mode at a time. Data Main Office Branch Office How BranchCache Works IDs Get Data Get Data Get Distributed Cache Branch Office Data Get Data Put Data Get Hosted Cache

Client Configuration Server Configuration BranchCache Requirements Off by default Enable and configure manually or by Group Policy Caching mode to cooperative or hosted Host name of hosted cache server Set client cache size Set cache location on disk Firewall rules required Off by default Enable and configure manually or by Group Policy Caching mode to cooperative or hosted Host name of hosted cache server Set client cache size Set cache location on disk Firewall rules required Windows Server 2008 R2 - required either in the main server location or at the branch office Windows 7 Enterprise - required on the client PCs Windows Server 2008 R2 - required either in the main server location or at the branch office Windows 7 Enterprise - required on the client PCs Not installed by default Enable and configure manually or by Group Policy Enable for all file shares or on a file share by file share basis If enabled on a Web server, must be enabled for all Web sites Hosted cache equipped with a certificate trusted by client computers suitable for TLS Not installed by default Enable and configure manually or by Group Policy Enable for all file shares or on a file share by file share basis If enabled on a Web server, must be enabled for all Web sites Hosted cache equipped with a certificate trusted by client computers suitable for TLS Demo

Course Evaluation