220 likes | 252 Views
Learn about Routing and Remote Access Service, VPN setup, network configuration, and authentication protocols for secure remote access. Understand how to configure VPN servers and manage network routes effectively.
E N D
Routing and Remote Access Service • RRAS • Formerly Remote Access Service in NT 4.0
Common Applications • Two functions: • Accepting Inbound calls • Universal Gateway to your network • Same functionality as if they were attached to the LAN, although slower. • Connecting one private network to another. • Placing Outbound calls (DUN) • Dial Up Networking • Internet Connectivity • Internet Gateway utilizing NAT (Network Address Translation)
Common Applications • Accepting VPN (virtual private network) from remote clients • Running a secure private network over an insecure public network (internet). • All clients need is an internet connection, a valid IP address and then establishing a VPN session to the RRAS server. • Session is secure and encrypted.
Things to consider • How will it be utilized? • What will be running on your DUN or VPN? • File-based apps versus client-server apps • Microsoft Access versus Microsoft SQL Server • Access requests continuously query the drive after each record search. • QuickBooks-File Based application. It will work, however performance will be unacceptable. • http://quickbooks.intuit.com/ • Microsoft SQL Server: a query is sent to the server from a client application and the query is run at the server and results are then transmitted back to the client. • MAS 200 from Best Software (Peachtree Accounting) • Client/server version: Sage MAS 200 uses the latest thin-client architecture to deliver high-speed performance across the Internet or via a dial-up connection.(http://www.sagesoftware.com/mas90/)
C o m p o n e n t D e s c r i p t i o n C o m p o n e n t D e s c r i p t i o n VPN server Accepts VPN connections from a VPN client VPN client Request VPN connection with a VPN server VPN connection Portion of connection where data is e n crypted VPN tunnel Portion of connection where data is enca p sulated Point-to-Point Tunneling Tunneling protocol Protocol (PPTP) Layer Two Tunneling Tunneling protocol that includes PPTP Protocol (L2TP) plus Layer 2 Forwarding (L2F) COMPONENTS OF A VPN
STATIC AND DYNAMIC ROUTING • Dynamic Routing on RRAS uses: • RIP-used for exchanging routing information among small to medium sized networks • OSPF-used for exchanging routing information among large to enterprise sized networks • IGMP Router and Proxy-used for multicast routing • DHCP Relay Agent-also considered a routing protocol. Routes DHCP packets between segments.
Routing Tables • TO view the table at the command prompt: • C:\>route print
PACKET FILTERING • Packet filtering determines what types of packets are allowed to be transmitted both inbound and outbound.
CONFIGURING A REMOTE ACCESS POLICY With Remote Access Policies, connections can be allowed or denied based on group membership, time of day, user attributes, type of connection as well as other variables.
AUTHENTICATION PROTOCOLSAuthentication methods on page 1431 • Extensible Authentication Protocol-Transport Layer Security (EAP-TLS)-typically used with smart cards. • Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) – Default for Microsoft, multiple • Microsoft Challenge Handshake Authentication Protocol version 1 (MS-CHAP v1) – support for legacy systems • Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication Protocol (EAP-MD5 CHAP)-similar to CHAP-2, but uses MD5 hashing and provides support for non-Microsoft clients. • Challenge Handshake Authentication Protocol (CHAP)-compatible with non-Microsoft clients. Does not support encryption of connection data. • Shiva Password Authentication Protocol (SPAP)-weak encryption. Does not support encryption of connection data. • Password Authentication Protocol (PAP)-user credentials are sent over network in plain text.