Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Remote access service


Published on

Remote access service

  1. 1. Remote Access Service<br />HCL CDC Etawah<br />
  2. 2. Contents for Remote Access Service:<br />1. What is Remote Access Service (RAS) and its Types ?<br />2. RAS Client Supported Connection Type <br />3. RAS Supporting Clients<br />4. Required RAS Server components<br />5. RAS Client supported Connection, Transport Authentication, VPN, and Bandwidth Protocols<br />6. Working with RAS<br />
  3. 3. What is Remote Access?<br /><ul><li>With a remote access connection, employees can access the corporate remote access server and log in to the network with their regular user account.
  4. 4. Employees can then use all the resources that would be available from the office desktop computer.</li></li></ul><li>Remote Access Server<br />Remote Access Server<br />Remote Access Service (RAS):<br />It is considered to be a WAN connection. It is built into Windows NT that enables Users to log into an NT-based LAN using a Modem.<br />
  5. 5. Type 1: Dial-up Remote Access<br />A dial-up remote access connection comprises remote access clients, a remote access server (RAS), and some telecommunication infrastructure (typically, an analog phone line). A remote client uses the telecommunication infrastructure to create a temporary physical or virtual circuit to a port on the RAS. After the circuit is created, the connection parameters are set. If RAS and remote access clients are not located in a local telecommunication boundary, incremental long distance charges are incurred. Even though it has limited scalability, this solution is good for corporations that have a low requirement for remote access. <br />Type 2: VPN Remote Access<br />A VPN remote access connection between a user and the enterprise data center consists of a VPN client, a VPN device or server, and the Internet. When a client accesses the Internet through a local ISP, a virtual point-to-point connection is created with a RAS acting as the VPN server. Once this connection is created, the parameters for the VPN connection can be set and a VPN tunnel established with the VPN device or server to access enterprise resources. In this case, the client is not required to dial long distance.<br />
  6. 6. RAS Supported Connection Type:<br />1. Public Switched Telephone Network (PSTN)<br />2. Integrated Service Digital Network (ISDN)<br />3. X.25<br />4. Asynchronous Transfer Mode (ATM) over Asymmetric Digital Subscriber Line (ADSL)<br />5. Digital Links and V.90<br />6.VPN Connection<br />
  7. 7. Public Switched Telephone Network<br /> (PSTN):<br />
  8. 8. Integrated Services Digital Network<br />(ISDN):<br />
  9. 9. X.25<br />
  10. 10. Asynchronous Transfer Mode (ATM) over Asymmetric Digital Subscriber Line (ADSL)<br />
  11. 11. Digital Links and V.90:<br />
  12. 12. VPN Connection For RAS:<br />
  13. 13. RAS Supporting Clients:<br />1. TCP/IP Clients using PPP<br />2. LAN Manager<br />3. DOS RAS<br />4. Windows for Workgroups<br />5. Windows 95/98<br />6.Windows NT 3.1 and above<br />7. Windows 2000/Xp<br />
  14. 14. Required RAS Server Components:<br />1. Modem<br />2. ISDN Interface<br />or<br />3. X.25 PAD<br />4. ATM<br />or<br />
  15. 15. Networking:<br />
  16. 16. Routing And Remote Access Server (RRAS):<br />
  17. 17. RAS Supported Connection Protocols:<br />1. Point to Point Protocol (PPP)<br />2. Serial Line Internet Protocol (SLIP)<br />3. Compressed SLIP (CSLIP)<br />4. Point to Point Multilink Protocol (PPMP)<br />5. Microsoft RAS or AsyBEUI<br />6. Callback Control Protocol (CBCP)<br />
  18. 18. Point to Point Protocol (PPP):<br />PPP (Point-to-Point Protocol) is designed for simple links which transport packets between two peers. These links provide full-duplex simultaneous bi-directional operation and are assumed to deliver packets in order. PPP provides a common solution for the easy connection of a wide variety of hosts, bridges and routers. <br />
  19. 19. Serial Line Internet Protocol (SLIP):<br />The Serial Line Internet Protocol is an encapsulation of the Internet Protocol designed to work over Serial Ports and Modem Connections. SLIP has been largely replaced by the Point to Point Protocol. SLIP will only support transport of IP Packets.<br />
  20. 20. Compressed SLIP (CSLIP):<br />CSLIP is essentially for data compression of the SLIP Protocol. It reduce packet overhead drastically. It requires CSLIP support on both the Client and Server ends. This may also be used with PPP and called CPPP.<br />
  21. 21. Point to Point Multilink Protocol:<br />Point to Point Multilink Protocol is a variation on the PPP that makes it possible to deploy multiple Physical Layer Connections and have them perceived as a single data link layer Connection by the upper layer protocols. It is typically used as a bandwidth-on-demand technique. Or combines bandwidth from several physical connections into one logical connection.<br />
  22. 22. Microsoft RAS or AsyBEUI:<br />It was not technically possible for an AsyBEUI client to "bridge" to IPX/SPX and talk NCPs to a NetWare server for resource sharing. Then AsyBEUI make the RAS server would pick up the traffic and send it to the IPX/SPX stack using its NetBIOS interface capability. This allowed you to use IPX/SPX as the protocol between two Windows NT machines.<br />Or AsyBEUI Client can now bridge to IPX/SPX and talk to Server.<br />
  23. 23. Callback Control Protocol (CBCP):<br />It allows the server to negotiate with the Client to call the Client back to establish the connection. CBCP negotiates the use of callback where the remote access server, after authenticating the remote access client, terminates the physical connection, waits a specified amount of time, and then calls the remote access client back at either a static or dynamically configured phone number. Common CBCP options include the phone number being used by the remote access server to call the remote access client back.<br />
  24. 24. RAS Client Transport Protocols:<br />1. NetBIOS Extended User Interface (NetBEUI)<br />2. Internetwork Packet Exchange/Sequence Packet Exchange (IPX/SPX- NWLink)<br />3. Transmission Control Protocol/<br />Internet Protocol (TCP/IP)<br />4. AppleTalk<br />
  25. 25. NetBIOS Extended User Interface (NetBEUI):<br />It is an enhanced version of the NetBIOS Protocol.<br />It is used by Network Operating Systems such as LAN Manager, LAN Server, Windows for Workgroups, Windows95 and Windows NT.<br />NetBEUI was originally designed by IBM for their LAN Manager server and later extended by Microsoft and Novell.<br />It is easy to configure and faster.<br />
  26. 26. Internetwork Packet Exchange/<br />Sequence Packet Exchange<br />(IPX/SPX- NWLink):<br />NWLink is Microsoft’s implementation of Novell’s IPX/SPX/NetBIOS Protocols.<br />IPX is Novell’s implementation of the Xerox Internet Datagram Protocol. IPX is a connectionless datagram protocol that delivers packets across the Internet.<br />SPX is Novell’s version of the Xerox Sequenced Packet Protocol. It is a transport layer protocol providing a packet delivery service for third party applications.<br />
  27. 27. Transmission Control Protocol/<br />Internet Protocol (TCP/IP):<br />The TCP/IP suite of protocols is the set of protocols used to communicate across the internet. <br />TCP provides a reliable stream delivery and virtual connection service to applications through the use of sequenced acknowledgment with retransmission of packets when necessary.<br />IP is the routing layer datagram service of the TCP/IP suite. All other protocols within the TCP/IP suite, except ARP and RARP, use IP to route frames from host to host. The IP frame header contains routing information and control information associated with datagram delivery.<br />
  28. 28. AppleTalk:<br />The Apple Talk Protocol suite includes the following protocols:<br />
  29. 29. RAS Supported Authentication Protocols:<br />1. Password Authentication Protocol (PAP)<br />2. Challenge Handshake Authentication Protocol (CHAP)<br />3. Microsoft CHAP (MS-CHAP) or MD5<br />4. Remote Authentication Dial-In User Service (RADIUS)<br />5. Extensible Authentication Protocol (EAP)<br />
  30. 30. Password Authentication Protocol (PAP):<br />Password Authentication Protocol provides a simple method for the peer to establish its identity using a 2-way handshake. The PAP packet is encapsulated in the Information field of a PPP data link layer frame.<br />Almost all Networking Operating System remote servers support PAP.<br /><ul><li>The least secure authentication protocol
  31. 31. Uses plain text passwords for authentication</li></li></ul><li>Challenge Handshake Authentication Protocol (CHAP):<br />Challenge Handshake Authentication Protocol is used to periodically verify the identity of the peer using a 3-way handshake. This is done upon initial link establishment and may be repeated any time after the link has been established.<br />Exactly one CHAP packet is encapsulated in the Information field of a PPP data link layer frame.<br />
  32. 32. Microsoft CHAP (MS-CHAP) or MD5:<br />Microsoft version of RSA Message Digest 5 (MD5) challenge and reply protocol. It only works non Microsoft Systems and enables data encryption.<br />Selecting this authentication method causes all data to be encrypted.<br />It is provide an authenticator-controlled password change mechanism.<br />And it is also provides an authenticator-controlled authentication retry mechanism.<br />It is defines failure codes returned in the Failure packet message field.<br />
  33. 33. Remote Authentication Dial-In User Service (RADIUS):<br />Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use a network service. <br />RADIUS serves three functions:<br />1. Authenticate Users or Devices before granting them access to a Network.<br />2. Authorize those Users or Devices for certain Network Services.<br />3. Account for usage of those services.<br />
  34. 34. Extensible Authentication Protocol<br />(EAP):<br />The Extensible Authentication Protocol (EAP) is best considered as a framework for transporting<br />authentication protocols, rather than as an authentication protocol itself. EAP can be used<br />for authenticating Wireless, Dial-up and VPN connections, and also Local Area Network (LAN) ports in conjunction with IEEE 802.1X.<br />EAP is used between a dial-in Client and Server to determine what authentication protocol will be used. <br />
  35. 35. RAS Supported VPN Protocols:<br />1. Point to Point Tunneling Protocol (PPTP)<br />2. Layer Two Tunneling Protocol (L2TP)<br />3. Internet Protocol Security (IPSec)<br />
  36. 36. Point to Point Tunneling Protocol<br />(PPTP):<br />PPTP works at the Link Layer. No encryption or key management included in specifications. A VPN tunneling Protocol used to send secure communications from point to point. It is used to access a network through the network using the speed of modem. It uses PPP encryption or Microsoft Point to Point Encryption over TCP as a transport Protocol. <br />
  37. 37. Layer Two Tunneling Protocol (L2TP):<br />L2TP combines features of L2F and PPTP and it is works on the Link Layer. No encryption or key management is included in specifications. It uses IPSec for encryption.<br />
  38. 38. Internet Protocol Security (IPSec):<br />IPSec works on Layer 3. It is a collection of security measures that address data privacy, integrity, authentication, and key management, in addition to tunneling.<br />IPSec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet.<br />
  39. 39. RAS Supported Bandwidth Allocation Protocols:<br />1. Bandwidth Allocation Control Protocol (BACP)<br />2. Bandwidth Allocation Protocol (BAP)<br />
  40. 40. Bandwidth Allocation Control Protocol (BACP):<br />BACP is an Internet protocol that helps users manage a combination of dial-up links, usually over ISDN connections. <br />BACP provides what is called dial on demand (or bandwidth on demand), a technique for providing additional bandwidth as needed by combining two or more circuits into a single circuit with a higher data throughput rate. The technique is useful for accommodating bursts in traffic, videoconferencing, backup sessions, and other requirements.<br />You use dial on demand to automatically combine channels when data traffic increases beyond the capacity of a single channel. <br />
  41. 41. Bandwidth Allocation Protocol (BAP):<br />The Bandwidth Allocation Protocol (BAP) manages the number of links in a multilink bundle. BAP defines datagram's to coordinate adding and removing individual links in a multilink bundle, as well as specifying which peer is responsible for decisions regarding managing bandwidth during a multilink connection. <br />
  42. 42. Remote Access for a Client:<br />Login Window for RAS <br />
  43. 43. Thank You<br />By- Apoorw Pandey<br /><br />