1 / 39

Module 11

Module 11. Configuring Mobile Computing and Remote Access . Module Overview. Configuring Mobile Computers and Device Settings Configuring VPN Access Configuring Remote Desktop and Remote Assistance Overview of DirectAccess. Lesson 1: Configuring Mobile Computers and Device Settings.

meagan
Download Presentation

Module 11

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Module 11 Configuring Mobile Computing and Remote Access

  2. Module Overview • Configuring Mobile Computers and Device Settings Configuring VPN Access Configuring Remote Desktop and Remote Assistance Overview of DirectAccess

  3. Lesson 1: Configuring Mobile Computers and Device Settings • Discussion: Types of Mobile Computers and Devices Tools for Configuring Mobile Computers and Device Settings What Are Mobile Device Sync Partnerships? Power Plans and Power-Saving Options Demonstration: Configuring Power Plans

  4. Discussion: Types of Mobile Computers and Devices • How do mobile computers differ from desktops? • What are key end-user needs that mobile computers resolve?

  5. Tools for Configuring Mobile Computers and Device Settings

  6. Mobile device sync partnerships update information about the mobile device and the host computer What Are Mobile Device Sync Partnerships? Files sent to desktop Desktop Mobile device Files sent to mobile device

  7. Power Plans and Power-Saving Options

  8. Demonstration: Configuring Power Plans In this demonstration, you will see how toconfigure a power plan

  9. Lab A: Configuring a Power Plan • Exercise 1: Creating and Configuring a New Power Plan Logon Information Virtual Machines 20687B-LON-DC1 20687B-LON-CL1 User Name Adatum\Adam Password Pa$$w0rd Estimated Time: 15 minutes

  10. Lab Scenario Adam is about to take a long trip to visit all of A. Datum’s customers in the United Kingdom. Before he leaves, he would like you to optimize the power consumption on his Windows 8 laptop.

  11. Lab Review • In the lab, you configured a power plan to optimize the battery life of Adam’s laptop computer. What are the compromises that arise from this?

  12. Lesson 2: Configuring VPN Access • What Is a VPN Connection? Tunneling Protocols for VPN Connections VPN Authentication What Is VPN Reconnect? Demonstration: Configuring a VPN What Is the Connection Manager Administration Kit? Configuring and Distributing a Connection Profile Demonstration: Creating a Connection Profile

  13. What Is a VPN Connection? Corporate Headquarters Large Branch Office Small Branch Office VPN Server VPN Server VPN Server Medium Branch Office VPN Home Office with VPN Client VPN Server A VPN provides a point-to-point connection between components of a private network, through a public network such as the Internet Remote User with VPN Client

  14. Tunneling Protocols for VPN Connections • Windows 8 supports four VPN tunneling protocols: • PPTP • L2TP/IPsec • SSTP • IKEv2

  15. VPN Authentication When selecting authentication, always choose the strongest and most secure form of authentication supported by all the components within your network infrastructure • Available methods: • PAP • CHAP • MS-CHAPv2 • EAP • Digital certificates

  16. What Is VPN Reconnect? The VPN Reconnect feature maintains connectivity across network outages • VPN Reconnect: • Provides seamless and consistent VPN connectivity • Uses the IKEv2 technology • Automatically reestablishes VPN connections when connectivity is available • Maintains the connection if users move between different networks • Makes the connection status transparent to users

  17. Demonstration: Configuring a VPN This demonstration shows how to configure VPN client settings

  18. What Is the Connection Manager Administration Kit? • The Connection Manager AdministrationKit: • Allows you to customize users’ remote connection experience by creating predefined connections on remote servers and networks • Creates an executable file that can be run on a client computer to establish a network connection that you have designed • Reduces help desk requests related to the configuration of RAS connections • Assists in problem resolution because the configuration is known • Reduces the likelihood of user errors when they configure their own connection objects

  19. Configuring and Distributing a Connection Profile • The CMAK Connection Profile Wizard assists in the process of creating custom connection profiles for users • Use the CMAK Connection Profile Wizard to configure: • The target operating system • Support for VPN • Support for dial-up, including the custom phone book • Proxy • Custom Help file • Custom support information

  20. Demonstration: Creating a Connection Profile This demonstration shows how to: • Install the CMAK feature • Create a connection profile • Examine the profile

  21. Lab B: Implementing a Virtual Private Network Connection • Exercise 1: Creating and Testing a VPN Connection Logon Information Virtual Machines 20687B-LON-DC1 20687B-LON-CL1 User Name Adatum\Administrator Password Pa$$w0rd Estimated Time: 30 minutes

  22. Lab Scenario Adam’s sales trip starts next week. He is keen to be able to access corporate data files while he is on the road. You decide to create a VPN on his laptop computer to facilitate this requirement.

  23. Lab Review • You created and test a VPN connection in the lab. When you are configuring the client-side of a VPN connection, what should factors do you need to consider?

  24. Lesson 3: Configuring Remote Desktop and Remote Assistance • What Are Remote Desktop and Remote Assistance? Configuring Remote Desktop Demonstration: Configuring Remote Assistance

  25. What Are Remote Desktop and Remote Assistance? Remote Desktop Remote Assistance • A Windows 8 feature that enables users to connect to their desktop computer from another device • Enables administrators to connect to multiple remote servers for administrative purposes • A Windows 8 feature that enables support staff to connect to a remote desktop computer • Optionally allows for remote control of that computer • Enables the seeking or offering of assistance

  26. Configuring Remote Desktop Configuring Remote Desktop includes setting it up on the remote computer and the host computer • Remote Computer • Open the System Window • Select Remote Settings • In the System Properties Window confirm Allow Remote Assistance selected • Under Remote Desktop select or add the users who can connect to this computer • Host Computer • Launch the Remote Desktop Connection • Choose Options to see the Remote Desktop configuration settings • On the General Tab, enter the remote computer’s name and your authentication credentials • Save your Connection Settings • Select preferences on the remaining tabs

  27. Demonstration: Configuring Remote Assistance In this demonstration, you will see how to: • Request Remote Assistance • Configure Windows Firewall to Enable Remote Administration • Provide Remote Assistance

  28. Lab C: Implementing Remote Desktop • Exercise 1: Configuring a Remote Desktop Connection Virtual Machines 20687B-LON-DC1 20687B-LON-CL1 20687B-LON-CL2 User Names Adatum\Administrator and Adatum\Adam Password Pa$$w0rd Logon Information Estimated Time: 15 minutes

  29. Lab Scenario Adam has a desktop computer in his office in London that he may wish to use while he travels around the UK between his customers.

  30. Lab Review • In the lab, you enabled the Remote Desktop feature through the firewall by editing the local firewall settings. Is there an alternative way in which you can make this change? In the lab, you configured Remote Desktop. In what circumstances can you envision using Remote Desktop to troubleshoot a user’s computer? If attempting to connect to a remote computer with Remote Desktop from an Internet-connected computer, what other possible configuration changes might you need to make?

  31. Lesson 4: Overview of DirectAccess • Discussion: Complexities of Managing VPNs What Is DirectAccess? Components of DirectAccess What Is the Name Resolution Policy Table? How DirectAccess Works for Internal Clients How DirectAccess Works for External Clients Configuring DirectAccess

  32. Discussion: Complexities of Managing VPNs What are the challenges you face when you implement VPNs?

  33. What Is DirectAccess? Features of DirectAccess: • Connects automatically to corporate network over the public network • Uses various protocols, including HTTPS, to establish IPv6 connectivity • Supports selected server access and IPsec authentication • Supports end-to-end authentication and encryption • Supports management of remote client computers • Allows remote users to connect directly to intranet servers DirectAccess enables seamless remote access to intranet resources without first establishing a VPN connection

  34. Components of DirectAccess AD DS domain controller DNS server Internal clients Internet websites DirectAccess server IPv6/IPsec External clients NRPT/ Consec Internal network resources Network location server PKI deployment

  35. What Is the Name Resolution Policy Table? NRPT is a table that defines DNS servers for different namespaces and corresponding security settings. It is used before the adapter’s DNS settings. • Using NRPT: • DNS servers can be defined for each DNS namespace rather than for each interface • DNS queries for specific namespaces can be optionally secured by using IPsec

  36. How DirectAccess Works for Internal Clients AD DS domain controller DNS server Internet websites Internal clients DirectAccess server Network location server NRPT Consec CRL dist point

  37. How DirectAccess Works for External Clients AD DS domain controller DNS server AD DS domain controller DNS server DNS server DNS server DNS server Internet websites AD DS domain controller DNS server AD DS domain controller DNS server DNS server DirectAccess server DirectAccess server DirectAccess server DirectAccess server Consec NRPT Consec Consec Consec NRPT NRPT NRPT Internal network resources Internal network resources Internal network resources External clients External clients External clients External clients Infrastructure Intranet Intranet Infrastructure Internal network resources Infrastructure

  38. Configuring DirectAccess Configure the AD DS domain controller and DNS Optionally, configure the PKI environment Configure the DirectAccess server Configure the DirectAccess clients and verify DirectAccess functionality

  39. Module Review and Takeaways • Review Questions

More Related