Section 11: Implementing Remote Connectivity CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.

Slides:



Advertisements
Similar presentations
By Taylor and Ed. Uses standard voice telephone lines Uses a modem to place a telephone call to another modem at a remote site Two major disadvantages.
Advertisements

Presented by: Eng. Karam Al-sofy
Networking at Home the Office and Globe
Digital Subscriber Line (DSL)
Networking at Home and Abroad
CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
Broadband local access technology
Modems and Other Communications Devices
WAN Technologies Dial-up modem connections Cheap Slow
Internet Connections By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
1 Chapter Overview Using Remote Connections SLIP and PPP WAN Technologies.
1 Chapter 12 Remote Network Access Using Remote Connections SLIP and PPP WAN Technologies.
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
(part 4).  Gateways  A gateway is responsible for translating information from one format to another and can run at any layer of the OSI model, depending.
Chapter 6 Telecommunications & Networks.
Networks Adapting Computers to Telecommunications Media.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
Hardware –Internet is a network of interconnected Host Computers or Hosts – Each host is assigned a unique IP address, e.g IP Stands for.
Computers © 2005 Prentice-Hall, Inc.Slide 1. Computers Chapter 6 Networks and Networking © 2005 Prentice-Hall, Inc.Slide 2.
1 Chapter 7 Networking: Computer Connections. Basic Components of a Network Sending device Communications link Receiving device.
Basic Computer Networks Configurations School of Business Eastern Illinois University © Abdou Illia, Spring 2007 Week 1, Thursday 1/10/2007)
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
Computer Networks & Security
WANs and Remote Connectivity
Microsoft Server 2008 R2 Group Policies & Network Policy and Access Services.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Public Switched Telephone Network (PSTN) dialup uses your phone connection to connect your computer to the internet. You need a modem, phone line and.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Introduction to Networks Networking Concepts IST-200 VWCC 1.
Windows Server 2008 Chapter 9 Last Update
Networking Technologies
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Networking Types of Internet Connection
Information and Communication Technology Fundamentals Credits Hours: 2+1 Instructor: Ayesha Bint Saleem.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. Networks & Networking Jaana Holvikivi 2012.
Chapter 7 WANs and Remote Connectivity. WAN Essentials A WAN traverses a large geographic area A WAN link is a connection from one site to another and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
WAN Technologies Dial-up modem connections
DIGITAL SUBSCRIBER LINE (DSL) ADVANCES Prepared by, Pow Jun Jiang (EE )
Unit 1—Computer Basics Lesson 7 Networks.
Communication Services Communication Services: –Problem: This chapter expands on topics introduced in earlier chapters related to long-distance communication.
WANs and Remote Connectivity
Intro to WAN VCC Semester 4, Chapter 2. Service providers Central Office (CO): Each telephone connects to a single point called a CO. Local Loop.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Essentials of Telecommunications.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
In a client/server arrangement, network services are located on a dedicated server. The server is a central computer that is continuously available to.
Higher Computing Networking. Networking – Local Area Networks.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 7B Data Communications.
Creating and Managing Networks CSC February, 1999.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Lec # 19 Data Communication
Overview of E- Business Technologies Irwan Sembiring.
Getting Online, Working Online
Understand Wide Area Networks (WANs)
CONNECTING TO THE INTERNET
Introduction to Networks
McGraw-Hill Technology Education
Basic Computer Networks Configurations
An Introduction to Computer Networking
McGraw-Hill Technology Education
Networking at Home and Abroad
Getting Online, Working Online
Getting Online, Working Online
Presentation transcript:

Section 11: Implementing Remote Connectivity CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE

Objectives Explain the capabilities and requirements for remote access Evaluate the current network and user environment Select an appropriate data transmission technology Design a secure remote access solution

Objectives (Con’t) Design optimal performance in a remote access solution Configure Windows 95/98 or Windows NT clients for remote access Connect remotely to a server using a modem-equipped Windows client

Remote Access Software (Server) Operates one or more modems connected to the server Provides network services to remote users Enforces network security across remote connections NetWare 5 Novell Internet Access Server (NIAS) Windows NT Server Remote Access Server (RAS)

Remote Network Services Login / Authentication Applications ( , database, etc.) Print documents remotely Connect to the Internet or intranet Obtain routing to distant network services Most other “locally” available services

Remote Access (Voice Line) Limitations Connection speed 28.8 – 56 K bps vs M bps (LAN) Connection security Phone lines allow an “in” for hackers to access your network Expense Long distance charges, or “measured rate” charges may apply

Implementing Remote Access Evaluate current network and user environment Select transmission media for use between server and remote workstation Prevent unauthorized remote users from accessing the network Tune remote client and server configurations for maximum performance Install and configure software to enable remote access

Evaluate current network and user environment Where is the best place to locate the remote access server? Is a server with enough capacity available somewhere? Is it located where inexpensive connections are possible? Where do remote users need to connect from, and what resources do they need to access? How many, how often, how many simultaneously?

Select transmission media ISDN Digital service Basic Rate Interface (BRI) Primary Rate (PRI) BRI has 2 B + 1 D channel B channel is 64 KB POTS Plain Old Telephone Service K

Transmission Media xDSL Dedicated Point-to-Point connections on existing copper wires Not available everywhere (like Payson) ADSL Mbps download / slower upload HDSL T1 speeds Mbps up/download Splitterless DSL <1 Mbps, no special equipment needed

Prevent unauthorized remote users from accessing the network Many remote access solutions by default have no security—they allow unrestricted access to any user by any port. Change this! Is your policy flexible enough to adapt to new or emerging security threats? What should be done when breaches are suspected? Who is notified? How do you test your security effectiveness?

Isolating a Remote Access Server Isolate the remote server, so if it is compromised, it does not compromise the entire network Demilitarized Zone Design All traffic from outside connects with the demilitarized server, which is connected to a screening router All traffic going to the screening router is considered insecure, and evaluated before access is granted

Tune remote configurations for maximum performance Low performance causes increased telco charges and lessens available links for other remote users Minimal login scripts Load frequently used apps on remote host Use shortcuts/menus to avoid directory lists Upgrade slower modems Train users to expect slower access remotely

Connecting Remotely Client usually initiates the session (calls the server) User is prompted for a username and password The modem becomes the slower equivalent of a NIC