Presentation is loading. Please wait.

Presentation is loading. Please wait.

Remote Access Network Management Kelly Given Allison Traina.

Similar presentations


Presentation on theme: "Remote Access Network Management Kelly Given Allison Traina."— Presentation transcript:

1 Remote Access Network Management Kelly Given Allison Traina

2 What is remote access?  Enables you to connect to your computer across the internet from virtually any computer, Pocket PC, or Smartphone.  Mouse and Keyboard control  Sound and printing  Access to files and software

3 Features  Supports multiple connections at the same time  Works through the firewalls and supports DHCP  Supports high screen resolutions and color depths  Remote shutdown, restart, & logoff capabilities

4 Terminal Services  Popular method for gaining remote access to Local Area Networks  Multiple remote computers can connect to terminal server on the LAN  Sends only keystrokes and mouse clicks  Receives screen updates from the host

5 Web Portals  Secure, Web-based interface for an application  Only need Internet Connection, Web browser software, and proper credentials to log on to the application

6 Virtual Private Networks  VPNs are wide area networks logically defined over public transmission systems.  Access to authorized users only  Convenient and relatively inexpensive WAN  Interoperability and security are important considerations when designing a VPN

7 Example of a VPN

8 Security  Data Stream Encryption  PAP Password Authentication Protocol  CHAP Challenge Handshake Authentication Protocol  RADIUS Remote Authentication Dial-In User Service

9 Data Stream Encryption  128-bit AES Encryption Ensures data is fully encrypted from end-to-end, including:  Screen Images  File Transfers  Keyboard and Mouse Input  Chat Text Encryption key is unique for each connection

10 PAP  Sends authentication request Usually user name and password  Compares credentials with user database  Not very secure Sends in clear text

11 CHAP  Encrypts user names and passwords for transmission  Requires 3 steps to complete the authentication process: Server sends ‘challenge’ Client adds password to ‘challenge’ and encrypts the new string Server compares string of characters

12 CHAP Advantages and Disadvantages  Advantages Password is never transmitted:  Alone  As clear text  Disadvantages Encrypted string of characters could be captured and decrypted  User name and password could be obtained

13 RADIUS  Used with dial-up networking connections Caller ID Verification  Specified phone number Callback Verification  Each user has a specific phone number  Server disconnects and calls user back at that number

14 Advantages of RADIUS  Direct connection between the user and the dial-up server No information is going across the public Internet  Example: user IDs and passwords  Protects against unauthorized users

15 Demonstration  www.gotomypc.com www.gotomypc.com

16 GoToMyPC Security Features  Blank out host computer screen while connected  Lock host keyboard and mouse  Lock host computer upon disconnection  Inactivity automatic logoff  Prominent notification when computer is being accessed

17 Software Downloads  Remote Desktop- Microsoft  pcAnywhere- Symantec  www.gotomypc.com – Free Trial  remotePC- Free Trial  www.download.com – reviews and free downloads

18 Web Site  http://kagiven.googlepages.com/home http://kagiven.googlepages.com/home


Download ppt "Remote Access Network Management Kelly Given Allison Traina."

Similar presentations


Ads by Google