780 likes | 1.92k Vues
Remote Access. Network Management Kelly Given Allison Traina. What is remote access?. Enables you to connect to your computer across the internet from virtually any computer, Pocket PC, or Smartphone. Mouse and Keyboard control Sound and printing Access to files and software. Features.
E N D
Remote Access Network Management Kelly Given Allison Traina
What is remote access? • Enables you to connect to your computer across the internet from virtually any computer, Pocket PC, or Smartphone. • Mouse and Keyboard control • Sound and printing • Access to files and software
Features • Supports multiple connections at the same time • Works through the firewalls and supports DHCP • Supports high screen resolutions and color depths • Remote shutdown, restart, & logoff capabilities
Terminal Services • Popular method for gaining remote access to Local Area Networks • Multiple remote computers can connect to terminal server on the LAN • Sends only keystrokes and mouse clicks • Receives screen updates from the host
Web Portals • Secure, Web-based interface for an application • Only need Internet Connection, Web browser software, and proper credentials to log on to the application
Virtual Private Networks • VPNs are wide area networks logically defined over public transmission systems. • Access to authorized users only • Convenient and relatively inexpensive WAN • Interoperability and security are important considerations when designing a VPN
Security • Data Stream Encryption • PAP • Password Authentication Protocol • CHAP • Challenge Handshake Authentication Protocol • RADIUS • Remote Authentication Dial-In User Service
Data Stream Encryption • 128-bit AES Encryption • Ensures data is fully encrypted from end-to-end, including: • Screen Images • File Transfers • Keyboard and Mouse Input • Chat Text • Encryption key is unique for each connection
PAP • Sends authentication request • Usually user name and password • Compares credentials with user database • Not very secure • Sends in clear text
CHAP • Encrypts user names and passwords for transmission • Requires 3 steps to complete the authentication process: • Server sends ‘challenge’ • Client adds password to ‘challenge’ and encrypts the new string • Server compares string of characters
CHAPAdvantages and Disadvantages • Advantages • Password is never transmitted: • Alone • As clear text • Disadvantages • Encrypted string of characters could be captured and decrypted • User name and password could be obtained
RADIUS • Used with dial-up networking connections • Caller ID Verification • Specified phone number • Callback Verification • Each user has a specific phone number • Server disconnects and calls user back at that number
Advantages of RADIUS • Direct connection between the user and the dial-up server • No information is going across the public Internet • Example: user IDs and passwords • Protects against unauthorized users
Demonstration • www.gotomypc.com
GoToMyPC Security Features • Blank out host computer screen while connected • Lock host keyboard and mouse • Lock host computer upon disconnection • Inactivity automatic logoff • Prominent notification when computer is being accessed
Software Downloads • Remote Desktop- Microsoft • pcAnywhere- Symantec • www.gotomypc.com – Free Trial • remotePC- Free Trial • www.download.com – reviews and free downloads
Web Site • http://kagiven.googlepages.com/home