1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.

Slides:



Advertisements
Similar presentations
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Advertisements

Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 5: Configuring Access for Remote Clients and Networks.
Module 1: Microsoft Windows 2000 Networking Services Infrastructure Overview.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Internet Protocol Security (IPSec)
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Module 6: NAT As a Solution for Internet Connectivity.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 13 – Network Security
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 5: Configuring Access for Remote Clients and Networks.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Module 13: Networking Service Designs. Overview Evaluating the Existing Configuration Identifying the Essential Design Decisions Providing Security Enhancing.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
1 Chapter 8: DHCP in IP Configuration Designs Designs That Include DHCP Essential DHCP Design Concepts Configuration Protection in DHCP Designs DHCP Design.
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Module 10: RADIUS As a Solution for Remote Access.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Network Access for Remote Networks
Virtual Private Network (VPN)
Virtual Private Network
Microsoft Windows NT 4.0 Authentication Protocols
Chapter 5: Multiprotocol Routing Designs
Chapter 15: Networking Services Design Optimization
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Goals Introduce the Windows Server 2003 family of operating systems
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection in VPN Remote Access Designs VPN Remote Access Design Optimization

2 VPN Remote Access Solutions

3 Routing and Remote Access and VPN Virtual private network (VPN) gives control over Authorized user accounts Security methods Resources to be accessed Uses Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP) VPN and Remote Authentication Dial-In User Service (RADIUS) solutions differ in many ways.

4 Routing and Remote Access and Windows 2000 Routing and Remote Access in Microsoft Windows 2000 includes Remote access client Remote access server

5 VPN Clients and Servers

6 VPN Remote Access Design Review Amount of data transmitted Number of locations Existing Internet connections Plans for network growth Number of simultaneous clients Operating systems used by clients Protocols used by clients

7 VPN Remote Access Design Decisions Integration into existing network Hardware requirements for servers Protection for confidential data Availability to remote access users Optimization of network traffic

8 VPN Remote Access Designs A third party provides connectivity. Cost reduction is an advantage. Some dial-up security is not available. Caller ID detection Remote user callback Authentication protocol for dial-up connection Password security features

9 VPN Remote Access Scenario

10 Number of VPN Remote Access Servers Determine the maximum number of users. Determine the sustained data rate. Perform a pilot test. Calculate the number of servers.

11 Placing VPN Remote Access Servers Placement goals: Centralize administration Reduce costs Reduce network traffic Single location Multiple locations Adjacent to resources

12 Single Location Configuration Provide enough PPTP or L2TP virtual ports. Advantages Centralized administration Lower administration costs Disadvantages Increased network traffic on segments No redundancy

13 Multiple Location Configuration Provide enough PPTP or L2TP virtual ports. Advantages Reduced network traffic between locations Redundancy Disadvantages Decentralized administration and support Increased administration costs

14 Placing VPN Servers Near Resources Reduces the segments traversed Improves performance for remote access clients

15 Remote Access Client Support Virtual ports PPTP L2TP Transport protocols determined by client needs Network address assignment methods Allocate manually Allocate automatically using Dynamic Host Configuration Protocol (DHCP)

16 Preventing Unauthorized Access Restrict remote access to resources on the server. Use filters to restrict traffic on servers. Place VPN servers for security Outside the private network On screened subnets Within the private network

17 Placing VPN Servers Outside the Private Network

18 Placing VPN Servers on Screened Subnets

19 Placing VPN Servers Inside the Private Network

20 Protecting Remote Access Data Authenticate remote users. Local accounts Active Directory directory service accounts Encrypt confidential data. Microsoft Point-to-Point Encryption (MPPE) Internet Protocol Security (IPSec) Enforce remote access policies.

21 Enhancing Remote Access Availability Use redundant VPN remote access servers. Network Load Balancing Round robin DNS Use multiple Internet connections. Dedicate a computer to running Routing and Remote Access.

22 Improving Remote Access Performance Upgrade hardware. Distribute clients across multiple servers. Use Network Load Balancing. Use round robin DNS. Dedicate a computer to running Routing and Remote Access.

23 Chapter Summary There are many advantages in using VPN for remote access. Consider the number of users and the data rate. Use multiple remote access servers. Evaluate the needs of remote clients. Protect private network resources. Improve the availability and performance of the design.