SlideShare a Scribd company logo
1 of 49
Remote Access
Connection
Ah. Fawad ‘Saiq’
E-mail: ah.fawad.saiq@gmail.com
Cell : 0793026501
Remote and Dial-up Connections
 Remote Access connections
 Virtual Private Networks
 Authentication Protocols and encryption
 Inbound Connections
We have two method for establish of remote access connection
Remote Access connections:
Dial-up PPP
Broadband TCP/IP
Remote and Dial-up Connections
is a form of Internet access that uses the facilities of the public
switched telephone network (PSTN) to establish a dialed connection
to an Internet service provider (ISP) via telephone lines. The user's
computer or router uses an attached modem to encode and decode
Internet Protocol packets and control information into and from
analogue audio frequency signals, respectively.
Dial-up Internet Access
Dial-up Connection
Dial-up Internet Access
Dial-up Internet Access
Dial-up Internet Access
Dial-up Internet Access
Dial-up Internet Access
Dial-up Internet Access
Broadband Internet Access
Broadband Internet service truly is the most used form of Internet access
because of its high access speeds; it is offered in four different forms, DSL
(or Digital Subscriber Line), also fiber-optic, cable, and satellite.
The old dial-up connection is the only non-broadband internet service available,
and even though it is cheaper, most Internet users are moving towards the
faster broadband Internet connection.
Categories of Unshielded Twisted Pair
Our company has a remote access server connection and we want to connect
Remotely making connection
VPN is special type for WAN(Wide Area Network) which achieves to connect
without use leased private lines. It uses to establish Internet.
Development of VPN is to establish secure and cost effective long distance links
between two or more computing networks.
VPN has its own set of software programs, protocols and security constructs
which make secure connectivity possible.
The USP of virtual private computer networks over conventional computer
networks lies in the fact that this technology is a significantly low cost alternative.
VPN (virtual Private Network)
VPN (virtual Private Network)
1. Remote client access via VPN
2. Peer to peer VPN (can let two separate local area networks, to be linked
together)
3. Private VPN (private intranet of a company that allows enabling of access
control for each user)
VPN (virtual Private Network)
Types of VPN
How VPN Works
Install VPN client programs on the machines which need remote access
Enable Internet connectivity provided by an ISP, after verification of user name
and password.
Access the private network easily use client remote computer.
VPN (virtual Private Network)
Benefit of VPN
Substantially easy and inexpensive to set it up
Can provide long distance connectivity, between multiple branches of a company
office, by providing secure data transfer and encryption, to enable video
conferencing, as well as data transfer.
Reduces the costs involved in maintaining long distance networks and costs of
operation.
VPN is a technology that are really cost effectiveness, efficiency and security
features of virtual private networks make them attractive and preferred choices
over conventional leased line based networks. Because of that, most industry
Intranets use VPN technology to establish internal connectivity.
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
DOMAIN
VPN (virtual Private Network)
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Authentication Protocols
PPP uses two authentication protocols PAP and CHAP.
CHAP is the preferred protocol, because CHAP uses 3-way handshake;
whereas, PAP uses 2-way handshake.
CHAP is an authentication scheme used by Point to Point Protocol (PPP)
servers to validate the identity of remote clients.
CHAP provides better security as compared to Password Authentication
Protocol (PAP). The protocol exists in two versions,
MS-CHAPv1 and MS-CHAPv2
Authentication Protocols
PAP : Sends username and password In clear text
SPAP : shiva LAN Rover client encrypts password but not data
Challenge-Handshake Authentication Protocol (CHAP):
encrypt username and password but not data , for non-Microsoft
operating systems
Ms-CHAP1 : one way password encryption
Ms-CHAP2 :mutual authentication , stronger encryption .(NT+98,VPN only)
Inbound Connections
Inbound connections are one of the types of network connections
created using the New Connection Wizard.
Inbound Connections
Inbound Connections
Inbound Connections
Inbound Connections
Inbound Connections
Remote access connection

More Related Content

What's hot

Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network servicesAtika Zaimi
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocolSaranyaK68
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDaniel Vinyar
 
Certified Hospitality Technology Professional
Certified Hospitality Technology ProfessionalCertified Hospitality Technology Professional
Certified Hospitality Technology ProfessionalHuy Pham
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkPeter R. Egli
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.igede tirtanata
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolLivePerson
 
Powerpoint exam
Powerpoint examPowerpoint exam
Powerpoint exampapapapogi
 

What's hot (19)

Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
Seminar 2 ppt
Seminar 2 pptSeminar 2 ppt
Seminar 2 ppt
 
Ccna 1 final
Ccna 1  finalCcna 1  final
Ccna 1 final
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Certified Hospitality Technology Professional
Certified Hospitality Technology ProfessionalCertified Hospitality Technology Professional
Certified Hospitality Technology Professional
 
Remote Web Desk
Remote Web DeskRemote Web Desk
Remote Web Desk
 
Vpn
VpnVpn
Vpn
 
Mpls vpn
Mpls vpnMpls vpn
Mpls vpn
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Vo lte white paper
Vo lte   white paperVo lte   white paper
Vo lte white paper
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
802.1x
802.1x802.1x
802.1x
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
 
Remote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile PhoneRemote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile Phone
 
Powerpoint exam
Powerpoint examPowerpoint exam
Powerpoint exam
 

Viewers also liked

Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone pptLaxman Puri
 
User Account Control Prensentation2
User Account Control Prensentation2User Account Control Prensentation2
User Account Control Prensentation2wsolomoniv
 
Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10Individual Software
 
Remote management, LDP SoftServe
Remote management, LDP SoftServeRemote management, LDP SoftServe
Remote management, LDP SoftServePetro Porchuk
 
Difference between windows 7 and windows 8 and windows 8 features
 Difference between windows 7 and windows 8 and windows 8 features Difference between windows 7 and windows 8 and windows 8 features
Difference between windows 7 and windows 8 and windows 8 featuresRizwan Ansari
 
windows7 vs windows8 ppt
windows7 vs windows8 ppt windows7 vs windows8 ppt
windows7 vs windows8 ppt KUMAR V S
 
ScienceShare.co.uk Shared Resource
ScienceShare.co.uk Shared ResourceScienceShare.co.uk Shared Resource
ScienceShare.co.uk Shared ResourceScienceShare.co.uk
 
Windows 10: The Top Features!
Windows 10: The Top Features!Windows 10: The Top Features!
Windows 10: The Top Features!Total Toolbar
 
Windows 8 vs windows 7 ppt
Windows 8 vs windows 7 pptWindows 8 vs windows 7 ppt
Windows 8 vs windows 7 pptDiya Mirza
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Vibhanshu Chaturvedi
 
Chemometric analysis of data using “unscrambler x”
Chemometric analysis of data using “unscrambler x”Chemometric analysis of data using “unscrambler x”
Chemometric analysis of data using “unscrambler x”nishidh41
 

Viewers also liked (19)

Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone ppt
 
Windows 10 – 8 Tips & Tricks
Windows 10 – 8 Tips & TricksWindows 10 – 8 Tips & Tricks
Windows 10 – 8 Tips & Tricks
 
User Account Control Prensentation2
User Account Control Prensentation2User Account Control Prensentation2
User Account Control Prensentation2
 
Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10
 
Remote management, LDP SoftServe
Remote management, LDP SoftServeRemote management, LDP SoftServe
Remote management, LDP SoftServe
 
Difference between windows 7 and windows 8 and windows 8 features
 Difference between windows 7 and windows 8 and windows 8 features Difference between windows 7 and windows 8 and windows 8 features
Difference between windows 7 and windows 8 and windows 8 features
 
Castle scramble
Castle scrambleCastle scramble
Castle scramble
 
windows7 vs windows8 ppt
windows7 vs windows8 ppt windows7 vs windows8 ppt
windows7 vs windows8 ppt
 
ScienceShare.co.uk Shared Resource
ScienceShare.co.uk Shared ResourceScienceShare.co.uk Shared Resource
ScienceShare.co.uk Shared Resource
 
Unscrambler Project
Unscrambler ProjectUnscrambler Project
Unscrambler Project
 
Remote Login
Remote LoginRemote Login
Remote Login
 
The Remote Access feature of Tally ERP 9
The Remote Access feature of Tally ERP 9The Remote Access feature of Tally ERP 9
The Remote Access feature of Tally ERP 9
 
Windows 10: The Top Features!
Windows 10: The Top Features!Windows 10: The Top Features!
Windows 10: The Top Features!
 
Windows 8 vs windows 7 ppt
Windows 8 vs windows 7 pptWindows 8 vs windows 7 ppt
Windows 8 vs windows 7 ppt
 
Windows 7 Security
Windows 7 SecurityWindows 7 Security
Windows 7 Security
 
Window 10 ppt
Window 10 pptWindow 10 ppt
Window 10 ppt
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8
 
Chemometric analysis of data using “unscrambler x”
Chemometric analysis of data using “unscrambler x”Chemometric analysis of data using “unscrambler x”
Chemometric analysis of data using “unscrambler x”
 

Similar to Remote access connection

Similar to Remote access connection (20)

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
vpn
vpnvpn
vpn
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Vpn
Vpn Vpn
Vpn
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
VirtualPrivateNetwork.ppt
VirtualPrivateNetwork.pptVirtualPrivateNetwork.ppt
VirtualPrivateNetwork.ppt
 
About vpn network .ppt
About vpn network .pptAbout vpn network .ppt
About vpn network .ppt
 
VPN mean .ppt
VPN mean .pptVPN mean .ppt
VPN mean .ppt
 
Virtual Private Network Presentation.ppt
Virtual Private Network Presentation.pptVirtual Private Network Presentation.ppt
Virtual Private Network Presentation.ppt
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
All About VPN
All About VPNAll About VPN
All About VPN
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 

Remote access connection

  • 1. Remote Access Connection Ah. Fawad ‘Saiq’ E-mail: ah.fawad.saiq@gmail.com Cell : 0793026501
  • 2. Remote and Dial-up Connections  Remote Access connections  Virtual Private Networks  Authentication Protocols and encryption  Inbound Connections
  • 3. We have two method for establish of remote access connection Remote Access connections: Dial-up PPP Broadband TCP/IP Remote and Dial-up Connections
  • 4. is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a dialed connection to an Internet service provider (ISP) via telephone lines. The user's computer or router uses an attached modem to encode and decode Internet Protocol packets and control information into and from analogue audio frequency signals, respectively. Dial-up Internet Access
  • 12. Broadband Internet Access Broadband Internet service truly is the most used form of Internet access because of its high access speeds; it is offered in four different forms, DSL (or Digital Subscriber Line), also fiber-optic, cable, and satellite. The old dial-up connection is the only non-broadband internet service available, and even though it is cheaper, most Internet users are moving towards the faster broadband Internet connection.
  • 13. Categories of Unshielded Twisted Pair Our company has a remote access server connection and we want to connect Remotely making connection
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. VPN is special type for WAN(Wide Area Network) which achieves to connect without use leased private lines. It uses to establish Internet. Development of VPN is to establish secure and cost effective long distance links between two or more computing networks. VPN has its own set of software programs, protocols and security constructs which make secure connectivity possible. The USP of virtual private computer networks over conventional computer networks lies in the fact that this technology is a significantly low cost alternative. VPN (virtual Private Network)
  • 24. 1. Remote client access via VPN 2. Peer to peer VPN (can let two separate local area networks, to be linked together) 3. Private VPN (private intranet of a company that allows enabling of access control for each user) VPN (virtual Private Network) Types of VPN
  • 25. How VPN Works Install VPN client programs on the machines which need remote access Enable Internet connectivity provided by an ISP, after verification of user name and password. Access the private network easily use client remote computer. VPN (virtual Private Network)
  • 26. Benefit of VPN Substantially easy and inexpensive to set it up Can provide long distance connectivity, between multiple branches of a company office, by providing secure data transfer and encryption, to enable video conferencing, as well as data transfer. Reduces the costs involved in maintaining long distance networks and costs of operation. VPN is a technology that are really cost effectiveness, efficiency and security features of virtual private networks make them attractive and preferred choices over conventional leased line based networks. Because of that, most industry Intranets use VPN technology to establish internal connectivity. VPN (virtual Private Network)
  • 32. VPN (virtual Private Network) DOMAIN
  • 41. Authentication Protocols PPP uses two authentication protocols PAP and CHAP. CHAP is the preferred protocol, because CHAP uses 3-way handshake; whereas, PAP uses 2-way handshake. CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP provides better security as compared to Password Authentication Protocol (PAP). The protocol exists in two versions, MS-CHAPv1 and MS-CHAPv2
  • 42. Authentication Protocols PAP : Sends username and password In clear text SPAP : shiva LAN Rover client encrypts password but not data Challenge-Handshake Authentication Protocol (CHAP): encrypt username and password but not data , for non-Microsoft operating systems Ms-CHAP1 : one way password encryption Ms-CHAP2 :mutual authentication , stronger encryption .(NT+98,VPN only)
  • 43. Inbound Connections Inbound connections are one of the types of network connections created using the New Connection Wizard.

Editor's Notes

  1. <Read the slide.>
  2. <Read the slide.>
  3. <Read the slide.>
  4. <Read the slide.>
  5. <Read the slide.>
  6. <Read the slide.>
  7. <Read the slide.>
  8. <Read the slide.>
  9. <Read the slide.>
  10. <Read the slide.>
  11. <Read the slide.>
  12. <Read the slide.>
  13. <Read the slide.>
  14. <Read the slide.>
  15. <Read the slide.>
  16. <Read the slide.>
  17. <Read the slide.>
  18. <Read the slide.>
  19. <Read the slide.>
  20. <Read the slide.>
  21. <Read the slide.>
  22. <Read the slide.>
  23. <Read the slide.>
  24. <Read the slide.>
  25. <Read the slide.>
  26. <Read the slide.>
  27. <Read the slide.>
  28. <Read the slide.>
  29. <Read the slide.>
  30. <Read the slide.>
  31. <Read the slide.>
  32. <Read the slide.>
  33. <Read the slide.>
  34. <Read the slide.>
  35. <Read the slide.>
  36. <Read the slide.>
  37. <Read the slide.>
  38. <Read the slide.>
  39. <Read the slide.>
  40. <Read the slide.>
  41. <Read the slide.>
  42. <Read the slide.>
  43. <Read the slide.>
  44. <Read the slide.>
  45. <Read the slide.>
  46. <Read the slide.>
  47. <Read the slide.>