120 likes | 600 Views
Security Roundtable. Secure Remote Access . Topics. Uses for Remote Access Do work from home Access to campus systems as if you were on campus Risks of Remote Access Unencrypted sessions can be snooped May leave remote station unprotected Windows Remote Desktop
E N D
Security Roundtable Secure Remote Access
Topics • Uses for Remote Access • Do work from home • Access to campus systems as if you were on campus • Risks of Remote Access • Unencrypted sessions can be snooped • May leave remote station unprotected • Windows Remote Desktop • Other Remote Access Options • VPN
Remote Desktop Protocol • Included with Windows XP • Uses 128-bit RC4 encryption • Does not use shared sessions • Supports file transfers • Is allowed through campus firewall (but not for long)
Remote Desktop Protocol • Works over TCP Port 3389
UltraVNC • Open Source (Free) • No encryption by default, but can be added with a plug-in • Uses shared sessions • Supports file transfers • Java viewer • Default port is 5900
RealVNC Free • Open Source (Free) • No encryption • Uses shared sessions • Does not support file transfers • Cross-Platform • Java Viewer • Default port is 5900
Radmin • Commercial Product (Not Free) • AES-256 encryption • Uses shared sessions • Supports file transfers • Additional features such as remote terminal, remote shutdown, and chat • Default port is 4899
K-State VPN • Creates an encrypted tunnel for all traffic going to and from K-State • Gives you a K-State IP address (129.130.X.X) • Allows you to getaround campus border firewall
Telnet • Telnet is unencrypted and login information is sent in clear text • Unix server supports SSH (encrypted) • PuTTY included inthe Cat Pack
File Transfer • FTP is unencrypted and login info is sent in clear text • Unix server supports SFTP and SCP • WinSCP included in the CatPack