Remote access connection

A
Ah Fawad SaiqStudent um Kabul University
Remote Access
Connection
Ah. Fawad ‘Saiq’
E-mail: ah.fawad.saiq@gmail.com
Cell : 0793026501
Remote and Dial-up Connections
 Remote Access connections
 Virtual Private Networks
 Authentication Protocols and encryption
 Inbound Connections
We have two method for establish of remote access connection
Remote Access connections:
Dial-up PPP
Broadband TCP/IP
Remote and Dial-up Connections
is a form of Internet access that uses the facilities of the public
switched telephone network (PSTN) to establish a dialed connection
to an Internet service provider (ISP) via telephone lines. The user's
computer or router uses an attached modem to encode and decode
Internet Protocol packets and control information into and from
analogue audio frequency signals, respectively.
Dial-up Internet Access
Dial-up Connection
Dial-up Internet Access
Dial-up Internet Access
Dial-up Internet Access
Dial-up Internet Access
Dial-up Internet Access
Dial-up Internet Access
Broadband Internet Access
Broadband Internet service truly is the most used form of Internet access
because of its high access speeds; it is offered in four different forms, DSL
(or Digital Subscriber Line), also fiber-optic, cable, and satellite.
The old dial-up connection is the only non-broadband internet service available,
and even though it is cheaper, most Internet users are moving towards the
faster broadband Internet connection.
Categories of Unshielded Twisted Pair
Our company has a remote access server connection and we want to connect
Remotely making connection
Remote access connection
Remote access connection
Remote access connection
Remote access connection
Remote access connection
Remote access connection
Remote access connection
Remote access connection
VPN is special type for WAN(Wide Area Network) which achieves to connect
without use leased private lines. It uses to establish Internet.
Development of VPN is to establish secure and cost effective long distance links
between two or more computing networks.
VPN has its own set of software programs, protocols and security constructs
which make secure connectivity possible.
The USP of virtual private computer networks over conventional computer
networks lies in the fact that this technology is a significantly low cost alternative.
VPN (virtual Private Network)
VPN (virtual Private Network)
1. Remote client access via VPN
2. Peer to peer VPN (can let two separate local area networks, to be linked
together)
3. Private VPN (private intranet of a company that allows enabling of access
control for each user)
VPN (virtual Private Network)
Types of VPN
How VPN Works
Install VPN client programs on the machines which need remote access
Enable Internet connectivity provided by an ISP, after verification of user name
and password.
Access the private network easily use client remote computer.
VPN (virtual Private Network)
Benefit of VPN
Substantially easy and inexpensive to set it up
Can provide long distance connectivity, between multiple branches of a company
office, by providing secure data transfer and encryption, to enable video
conferencing, as well as data transfer.
Reduces the costs involved in maintaining long distance networks and costs of
operation.
VPN is a technology that are really cost effectiveness, efficiency and security
features of virtual private networks make them attractive and preferred choices
over conventional leased line based networks. Because of that, most industry
Intranets use VPN technology to establish internal connectivity.
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
DOMAIN
VPN (virtual Private Network)
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Authentication Protocols
PPP uses two authentication protocols PAP and CHAP.
CHAP is the preferred protocol, because CHAP uses 3-way handshake;
whereas, PAP uses 2-way handshake.
CHAP is an authentication scheme used by Point to Point Protocol (PPP)
servers to validate the identity of remote clients.
CHAP provides better security as compared to Password Authentication
Protocol (PAP). The protocol exists in two versions,
MS-CHAPv1 and MS-CHAPv2
Authentication Protocols
PAP : Sends username and password In clear text
SPAP : shiva LAN Rover client encrypts password but not data
Challenge-Handshake Authentication Protocol (CHAP):
encrypt username and password but not data , for non-Microsoft
operating systems
Ms-CHAP1 : one way password encryption
Ms-CHAP2 :mutual authentication , stronger encryption .(NT+98,VPN only)
Inbound Connections
Inbound connections are one of the types of network connections
created using the New Connection Wizard.
Inbound Connections
Inbound Connections
Inbound Connections
Inbound Connections
Inbound Connections
Remote access connection
1 von 49

Recomendados

Remote Access von
Remote AccessRemote Access
Remote Accesszaisahil
1.1K views34 Folien
Remote access service von
Remote access serviceRemote access service
Remote access serviceApoorw Pandey
16.4K views43 Folien
Vpn " Virtual Private Network " von
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Muhammad Usman
419 views26 Folien
Vpn von
VpnVpn
VpnKajal Thakkar
47.1K views46 Folien
CCNA 1 von
CCNA 1CCNA 1
CCNA 1Asish Verma
690 views22 Folien
Voice over IP ppt von
Voice over IP pptVoice over IP ppt
Voice over IP pptAkash Sharma
81 views18 Folien

Más contenido relacionado

Was ist angesagt?

Topic 2.4 network services von
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network servicesAtika Zaimi
85 views13 Folien
Mobile internet protocol von
Mobile internet protocolMobile internet protocol
Mobile internet protocolSaranyaK68
100 views59 Folien
Seminar 2 ppt von
Seminar 2 pptSeminar 2 ppt
Seminar 2 pptsathya5691
4.4K views22 Folien
Ccna 1 final von
Ccna 1  finalCcna 1  final
Ccna 1 finalVahdet Shehu
442 views10 Folien
Deep Packet Inspection technology evolution von
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDaniel Vinyar
5.7K views14 Folien
Vpn networks kami von
Vpn networks kamiVpn networks kami
Vpn networks kamikamran_share
1.5K views36 Folien

Was ist angesagt?(19)

Topic 2.4 network services von Atika Zaimi
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
Atika Zaimi85 views
Mobile internet protocol von SaranyaK68
Mobile internet protocolMobile internet protocol
Mobile internet protocol
SaranyaK68100 views
Seminar 2 ppt von sathya5691
Seminar 2 pptSeminar 2 ppt
Seminar 2 ppt
sathya56914.4K views
Deep Packet Inspection technology evolution von Daniel Vinyar
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
Daniel Vinyar5.7K views
Certified Hospitality Technology Professional von Huy Pham
Certified Hospitality Technology ProfessionalCertified Hospitality Technology Professional
Certified Hospitality Technology Professional
Huy Pham10.5K views
Mpls vpn von rel comm
Mpls vpnMpls vpn
Mpls vpn
rel comm956 views
VPN - Virtual Private Network von Peter R. Egli
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Peter R. Egli21.1K views
Cisco discovery d homesb module 10 final exam - v.4 in english. von igede tirtanata
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.
igede tirtanata697 views
SIP - Introduction to SIP Protocol von LivePerson
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
LivePerson8.9K views
Powerpoint exam von papapapogi
Powerpoint examPowerpoint exam
Powerpoint exam
papapapogi384 views

Destacado

Remote access from a smartphone ppt von
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone pptLaxman Puri
3.4K views25 Folien
Windows 10 – 8 Tips & Tricks von
Windows 10 – 8 Tips & TricksWindows 10 – 8 Tips & Tricks
Windows 10 – 8 Tips & TricksIndividual Software
4.3K views10 Folien
User Account Control Prensentation2 von
User Account Control Prensentation2User Account Control Prensentation2
User Account Control Prensentation2wsolomoniv
915 views7 Folien
Eight Hot New Features of Windows 10 von
Eight Hot New Features of Windows 10Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10Individual Software
6.9K views10 Folien
Remote management, LDP SoftServe von
Remote management, LDP SoftServeRemote management, LDP SoftServe
Remote management, LDP SoftServePetro Porchuk
740 views27 Folien
Difference between windows 7 and windows 8 and windows 8 features von
 Difference between windows 7 and windows 8 and windows 8 features Difference between windows 7 and windows 8 and windows 8 features
Difference between windows 7 and windows 8 and windows 8 featuresRizwan Ansari
3.6K views21 Folien

Destacado(19)

Remote access from a smartphone ppt von Laxman Puri
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone ppt
Laxman Puri3.4K views
User Account Control Prensentation2 von wsolomoniv
User Account Control Prensentation2User Account Control Prensentation2
User Account Control Prensentation2
wsolomoniv915 views
Remote management, LDP SoftServe von Petro Porchuk
Remote management, LDP SoftServeRemote management, LDP SoftServe
Remote management, LDP SoftServe
Petro Porchuk740 views
Difference between windows 7 and windows 8 and windows 8 features von Rizwan Ansari
 Difference between windows 7 and windows 8 and windows 8 features Difference between windows 7 and windows 8 and windows 8 features
Difference between windows 7 and windows 8 and windows 8 features
Rizwan Ansari3.6K views
windows7 vs windows8 ppt von KUMAR V S
windows7 vs windows8 ppt windows7 vs windows8 ppt
windows7 vs windows8 ppt
KUMAR V S3.8K views
Windows 10: The Top Features! von Total Toolbar
Windows 10: The Top Features!Windows 10: The Top Features!
Windows 10: The Top Features!
Total Toolbar3.6K views
Windows 8 vs windows 7 ppt von Diya Mirza
Windows 8 vs windows 7 pptWindows 8 vs windows 7 ppt
Windows 8 vs windows 7 ppt
Diya Mirza20.6K views
Window 10 ppt von Monu Jangid
Window 10 pptWindow 10 ppt
Window 10 ppt
Monu Jangid21.8K views
Chemometric analysis of data using “unscrambler x” von nishidh41
Chemometric analysis of data using “unscrambler x”Chemometric analysis of data using “unscrambler x”
Chemometric analysis of data using “unscrambler x”
nishidh411.6K views

Similar a Remote access connection

Virtual Private Network von
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
959 views17 Folien
Vp npresentation 2 von
Vp npresentation 2Vp npresentation 2
Vp npresentation 2Swarup Kumar Mall
1.4K views38 Folien
vpn von
vpnvpn
vpnvimal0123
152 views35 Folien
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA von
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
362 views15 Folien
Vpn von
Vpn Vpn
Vpn Vikram Rathore
47 views37 Folien
12 Understanding V P Ns von
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P NsAamirAziz
893 views43 Folien

Similar a Remote access connection (20)

Virtual Private Network von Richa Singh
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Richa Singh959 views
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA von Saikiran Panjala
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala362 views
12 Understanding V P Ns von AamirAziz
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
AamirAziz893 views
VirtualPrivateNetwork.ppt von tahaniali27
VirtualPrivateNetwork.pptVirtualPrivateNetwork.ppt
VirtualPrivateNetwork.ppt
tahaniali2727 views
Virtual Private Network- VPN von Nikhil Kumar
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
Nikhil Kumar1.2K views
csevpnppt-170905123948 (1).pdf von HirazNor
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
HirazNor7 views

Último

Voice Logger - Telephony Integration Solution at Aegis von
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at AegisNirmal Sharma
17 views1 Folie
Attacking IoT Devices from a Web Perspective - Linux Day von
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day Simone Onofri
15 views68 Folien
Data-centric AI and the convergence of data and model engineering: opportunit... von
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...Paolo Missier
34 views40 Folien
SAP Automation Using Bar Code and FIORI.pdf von
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
19 views38 Folien
The Research Portal of Catalonia: Growing more (information) & more (services) von
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
73 views25 Folien
Vertical User Stories von
Vertical User StoriesVertical User Stories
Vertical User StoriesMoisés Armani Ramírez
11 views16 Folien

Último(20)

Voice Logger - Telephony Integration Solution at Aegis von Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma17 views
Attacking IoT Devices from a Web Perspective - Linux Day von Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 views
Data-centric AI and the convergence of data and model engineering: opportunit... von Paolo Missier
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier34 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 von IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Transcript: The Details of Description Techniques tips and tangents on altern... von BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada130 views
6g - REPORT.pdf von Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex9 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab15 views
DALI Basics Course 2023 von Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg14 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... von James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson33 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... von Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker26 views
Five Things You SHOULD Know About Postman von Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman27 views
1st parposal presentation.pptx von i238212
1st parposal presentation.pptx1st parposal presentation.pptx
1st parposal presentation.pptx
i2382129 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive von Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive

Remote access connection

  • 1. Remote Access Connection Ah. Fawad ‘Saiq’ E-mail: ah.fawad.saiq@gmail.com Cell : 0793026501
  • 2. Remote and Dial-up Connections  Remote Access connections  Virtual Private Networks  Authentication Protocols and encryption  Inbound Connections
  • 3. We have two method for establish of remote access connection Remote Access connections: Dial-up PPP Broadband TCP/IP Remote and Dial-up Connections
  • 4. is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a dialed connection to an Internet service provider (ISP) via telephone lines. The user's computer or router uses an attached modem to encode and decode Internet Protocol packets and control information into and from analogue audio frequency signals, respectively. Dial-up Internet Access
  • 12. Broadband Internet Access Broadband Internet service truly is the most used form of Internet access because of its high access speeds; it is offered in four different forms, DSL (or Digital Subscriber Line), also fiber-optic, cable, and satellite. The old dial-up connection is the only non-broadband internet service available, and even though it is cheaper, most Internet users are moving towards the faster broadband Internet connection.
  • 13. Categories of Unshielded Twisted Pair Our company has a remote access server connection and we want to connect Remotely making connection
  • 22. VPN is special type for WAN(Wide Area Network) which achieves to connect without use leased private lines. It uses to establish Internet. Development of VPN is to establish secure and cost effective long distance links between two or more computing networks. VPN has its own set of software programs, protocols and security constructs which make secure connectivity possible. The USP of virtual private computer networks over conventional computer networks lies in the fact that this technology is a significantly low cost alternative. VPN (virtual Private Network)
  • 24. 1. Remote client access via VPN 2. Peer to peer VPN (can let two separate local area networks, to be linked together) 3. Private VPN (private intranet of a company that allows enabling of access control for each user) VPN (virtual Private Network) Types of VPN
  • 25. How VPN Works Install VPN client programs on the machines which need remote access Enable Internet connectivity provided by an ISP, after verification of user name and password. Access the private network easily use client remote computer. VPN (virtual Private Network)
  • 26. Benefit of VPN Substantially easy and inexpensive to set it up Can provide long distance connectivity, between multiple branches of a company office, by providing secure data transfer and encryption, to enable video conferencing, as well as data transfer. Reduces the costs involved in maintaining long distance networks and costs of operation. VPN is a technology that are really cost effectiveness, efficiency and security features of virtual private networks make them attractive and preferred choices over conventional leased line based networks. Because of that, most industry Intranets use VPN technology to establish internal connectivity. VPN (virtual Private Network)
  • 32. VPN (virtual Private Network) DOMAIN
  • 41. Authentication Protocols PPP uses two authentication protocols PAP and CHAP. CHAP is the preferred protocol, because CHAP uses 3-way handshake; whereas, PAP uses 2-way handshake. CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP provides better security as compared to Password Authentication Protocol (PAP). The protocol exists in two versions, MS-CHAPv1 and MS-CHAPv2
  • 42. Authentication Protocols PAP : Sends username and password In clear text SPAP : shiva LAN Rover client encrypts password but not data Challenge-Handshake Authentication Protocol (CHAP): encrypt username and password but not data , for non-Microsoft operating systems Ms-CHAP1 : one way password encryption Ms-CHAP2 :mutual authentication , stronger encryption .(NT+98,VPN only)
  • 43. Inbound Connections Inbound connections are one of the types of network connections created using the New Connection Wizard.

Hinweis der Redaktion

  1. <Read the slide.>
  2. <Read the slide.>
  3. <Read the slide.>
  4. <Read the slide.>
  5. <Read the slide.>
  6. <Read the slide.>
  7. <Read the slide.>
  8. <Read the slide.>
  9. <Read the slide.>
  10. <Read the slide.>
  11. <Read the slide.>
  12. <Read the slide.>
  13. <Read the slide.>
  14. <Read the slide.>
  15. <Read the slide.>
  16. <Read the slide.>
  17. <Read the slide.>
  18. <Read the slide.>
  19. <Read the slide.>
  20. <Read the slide.>
  21. <Read the slide.>
  22. <Read the slide.>
  23. <Read the slide.>
  24. <Read the slide.>
  25. <Read the slide.>
  26. <Read the slide.>
  27. <Read the slide.>
  28. <Read the slide.>
  29. <Read the slide.>
  30. <Read the slide.>
  31. <Read the slide.>
  32. <Read the slide.>
  33. <Read the slide.>
  34. <Read the slide.>
  35. <Read the slide.>
  36. <Read the slide.>
  37. <Read the slide.>
  38. <Read the slide.>
  39. <Read the slide.>
  40. <Read the slide.>
  41. <Read the slide.>
  42. <Read the slide.>
  43. <Read the slide.>
  44. <Read the slide.>
  45. <Read the slide.>
  46. <Read the slide.>
  47. <Read the slide.>