SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Implementing VPN using Direct Access technology
Feras Farag Alrmali
June 2019
Abstract
This paper provides a common sense definition of a traditional VPN, and an overview
of different problems that occur on it, And draws attention to Direct Access
technology that may be a better solution to traditional VPN problems.
1.Introduction
VPN stands for "Virtual Private Network" .A VPN is a private network in the sense
that protected by deferent security protocols, work between known parties. VPNs
are only "virtually" private, however, because these data is travel over internet
instead of fully dedicated private connections. The real advantage of a VPN is
decrease cost compared to traditional leased lines or dial up networking.
A virtual private network (VPN) is a network that uses a public telecommunication
infrastructure, such as the Internet, to provide remote offices or individual users
with secure access to their organization's network. A virtual private network can be
contrasted with an expensive system of owned or leased lines that can only be used
by one organization. The goal of a VPN is to provide the organization with the same
capabilities, but at a much lower cost securely through public network.[1]
A VPN works with some security protocols features such as the Layer Two Tunneling
Protocol (L2TP) along with IPSec (IPSec/L2TP) to maintaining privacy when info
traveling over shared public infrastructure. These protocols works on encrypting
data at the sending end and decrypting it at the receiving end, send the data through
a "tunnel" that cannot be "entered" by data that is not properly encrypted. An
additional level of security involves encrypting not only the data, but also the
originating and receiving network addresses.
There are more than one type of VPN and here we while explain one of these types :
Remote Access VPN:
What is Remote Access VPN?
Remote Access VPN is also called virtual private dial-up networks
(VPDNs).These are user-to-LAN connections used when employees of a company
who are in remote locations need to connect to the company's private network. A
company that wants to set up a remote-access VPN usually outsources to an ESP or
enterprise service provider. The ESP sets up a NAS (network access server) and also
provides remote users with the software they need for their computers. Then users
simply dial the NAS using a toll-free number and access the network via their VPN
client software. VPNs offer a good third-party service for encrypted, secure
connections between remote users within a private network.[1]
Fig 1. Remote Access VPNs
2.Problem statement:
These are some problems that occur in traditional Remote Access VPNs such as :
1. VPN connections are user initiated and therefore optional. It is up to the user
to decide when they want to connect to the corporate network.[2]
2. Many VPN protocols aren’t firewall friendly, which can impede the successful
establishment of a VPN connection. [2]
3. VPNs often require investments in proprietary hardware and per-user
licensing. [2]
4. Proprietary software is commonly required to leverage all of the features
provided by VPN solutions. This software must be deployed and managed by
IT administrators. [2]
5. A VPN connection can be established from any client machine with the VPN
client software installed .This makes integration with a multifactor
authentication solution an essential requirement, which makes the solution
more complex and difficult to support. [2]
solution (DIRECT ACCESS TECHNOLOGY)
WHAT IS DIRECT ACCESS TECHNOLOGY?
Direct Access, a remote access technology included as part of the Unified Remote
Access role in Windows Server from 2008 R2, provides seamless and transparent
always-on remote network connectivity for managed (domain-joined) Windows
clients. [2]
It provides wide connectivity and access to internal applications and data, and does
so without requiring any user interaction. The solution allows remote workers to
access internal resources in the same familiar way, regardless of their physical
location, resulting in a superior remote access experience and increased
productivity.[2]
Direct Access client computers have consistent remote network access, enabling
them to update group policy and check in with systems-management servers more
consistently than traditional client-based VPN allows. Direct Access connections are
also bidirectional, allowing IT administrators to proactively manage their field-based
assets just as they do their on-premise systems. The end result is having fully
managed and secure mobile computers.[2]
Direct Access is structured deployed Windows platform technologies such as Active
Directory Domain Services (AD DS) and Group Policy, Active Directory Certificate
Services (AD CS), and IPsec. Direct Access also based heavily on IPv6.[2]
Seamless and Transparent:
Direct Access is a paradigm shift in the way corporate IT provides secure remote
access. Unlike traditional VPN, which is user initiated, Direct Access works at the
machine level to provide seamless and transparent, always-on secure remote
corporate network connectivity any time the computer has an active Internet
connection. Because it requires no user interaction, it streamlines and simplifies the
remote access experience for the end user.[2]
Bi-directional:
Direct Access is also bi-directional, which is a key differentiator between it and VPN.
The bi-directional nature of Direct Access enables some interesting new use cases for
secure remote access. For example, an administrator on the corporate network can
initiate a remote desktop connection to a remotely connected Direct Access client
for the purposes of troubleshooting or providing assistance. Configuration and
software can be deployed to Direct Access clients using System Center Configuration
Manager (SCCM) , and vulnerability scans can be performed remotely.[2]
Direct Access vs. VPN
VPN connections are user initiated and therefore optional. It is up to the user to
decide when they want to connect to the corporate network. By comparison, Direct
Access is seamless and transparent in nature, is completely automatic, and requires
no user interaction to establish a connection. [2]
Many VPN protocols aren’t firewall friendly, which can impede the successful
establishment of a VPN connection. Direct Access can establish its secure remote
connection using HTTPS, which is commonly allowed through most firewalls. [2]
VPNs often require investments in proprietary hardware and per-user licensing.
Direct Access can be deployed on existing virtual infrastructure and does not require
additional user licensing. [2]
Proprietary software is commonly required to leverage all of the features provided
by VPN solutions. This software must be deployed and managed by IT
administrators. DirectAccess requires no additional third-party software to be
installed. All settings for DirectAccess are managed through Group Policy Objects
(GPOs) in Active Directory. [2]
A VPN connection can be established from any client machine with the VPN client
software installed. This makes integration with a multifactor authentication solution
an essential requirement, which makes the solution more complex and difficult to
support. A Direct Access connection can only be established from a client computer
that has been provisioned for Direct Access by IT, reducing the need to employ
strong authentication for Direct Access connections. [2]
4.Conclusion:
In this work we gained some information about traditional VPN, and Direct access
technology ,and make a small compared on them, and from these information's we
can say that the direct access technology may be better solution than traditional
remote access VPN.
5.References:
Papers:
[1] Nepal, s.,& Bhattarai, S. (2016). VPN research, 1-10.
DOI: 10.13140/RG.2.1.4215.8160
Books:
[2] Richard M. Hicks. (2016). "Implementing DirectAccess with Windows Server
2016" , 1-296. DOI 10.1007/978-1-4842-2059-7

Weitere Àhnliche Inhalte

Was ist angesagt?

Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private NetworkShubhayu Roy
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentationAyano Midakso
 
VPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessVPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessSafar Safarov
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsSovello Hildebrand
 
Headquartered at home community publication nx n pakistan
Headquartered at home   community publication nx n pakistanHeadquartered at home   community publication nx n pakistan
Headquartered at home community publication nx n pakistanTariq Mustafa
 
Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2LinkedIn
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)Shreyank Gupta
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentationRajesh Thakur
 
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...Deenuji Loganathan
 
Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...
Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...
Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...Irepa International, LLC
 
Presentation1 shweta
Presentation1 shweta Presentation1 shweta
Presentation1 shweta swet4
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerRick G. Garibay
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?Zscaler
 

Was ist angesagt? (20)

Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Ism
IsmIsm
Ism
 
VPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessVPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP Business
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/Organizations
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
Headquartered at home community publication nx n pakistan
Headquartered at home   community publication nx n pakistanHeadquartered at home   community publication nx n pakistan
Headquartered at home community publication nx n pakistan
 
Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Vpn
Vpn Vpn
Vpn
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
 
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
 
Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...
Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...
Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...
 
Presentation1 shweta
Presentation1 shweta Presentation1 shweta
Presentation1 shweta
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's Primer
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
Network security
Network securityNetwork security
Network security
 

Ähnlich wie Implementing vpn using direct access technology

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private NetworkAbhinav Dwivedi
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefitsAnthony Daniel
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkadeelahmed0345
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpnjadeja dhanraj
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajendra Dangwal
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpnRajesh Porwal
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkVINAY GATLA
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxearleanp
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxtodd521
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Ch11 Vpn
Ch11 VpnCh11 Vpn
Ch11 Vpnphanleson
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)ssusera07323
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.pptssusera1b6c7
 

Ähnlich wie Implementing vpn using direct access technology (20)

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
The vpn
The vpnThe vpn
The vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
All About VPN
All About VPNAll About VPN
All About VPN
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn
VpnVpn
Vpn
 
Ch11 Vpn
Ch11 VpnCh11 Vpn
Ch11 Vpn
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 

KĂŒrzlich hochgeladen

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

KĂŒrzlich hochgeladen (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Implementing vpn using direct access technology

  • 1. Implementing VPN using Direct Access technology Feras Farag Alrmali June 2019 Abstract This paper provides a common sense definition of a traditional VPN, and an overview of different problems that occur on it, And draws attention to Direct Access technology that may be a better solution to traditional VPN problems. 1.Introduction VPN stands for "Virtual Private Network" .A VPN is a private network in the sense that protected by deferent security protocols, work between known parties. VPNs are only "virtually" private, however, because these data is travel over internet instead of fully dedicated private connections. The real advantage of a VPN is decrease cost compared to traditional leased lines or dial up networking. A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost securely through public network.[1] A VPN works with some security protocols features such as the Layer Two Tunneling Protocol (L2TP) along with IPSec (IPSec/L2TP) to maintaining privacy when info traveling over shared public infrastructure. These protocols works on encrypting data at the sending end and decrypting it at the receiving end, send the data through a "tunnel" that cannot be "entered" by data that is not properly encrypted. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses. There are more than one type of VPN and here we while explain one of these types : Remote Access VPN: What is Remote Access VPN? Remote Access VPN is also called virtual private dial-up networks (VPDNs).These are user-to-LAN connections used when employees of a company who are in remote locations need to connect to the company's private network. A company that wants to set up a remote-access VPN usually outsources to an ESP or
  • 2. enterprise service provider. The ESP sets up a NAS (network access server) and also provides remote users with the software they need for their computers. Then users simply dial the NAS using a toll-free number and access the network via their VPN client software. VPNs offer a good third-party service for encrypted, secure connections between remote users within a private network.[1] Fig 1. Remote Access VPNs 2.Problem statement: These are some problems that occur in traditional Remote Access VPNs such as : 1. VPN connections are user initiated and therefore optional. It is up to the user to decide when they want to connect to the corporate network.[2] 2. Many VPN protocols aren’t firewall friendly, which can impede the successful establishment of a VPN connection. [2] 3. VPNs often require investments in proprietary hardware and per-user licensing. [2] 4. Proprietary software is commonly required to leverage all of the features provided by VPN solutions. This software must be deployed and managed by IT administrators. [2] 5. A VPN connection can be established from any client machine with the VPN client software installed .This makes integration with a multifactor authentication solution an essential requirement, which makes the solution more complex and difficult to support. [2] solution (DIRECT ACCESS TECHNOLOGY) WHAT IS DIRECT ACCESS TECHNOLOGY? Direct Access, a remote access technology included as part of the Unified Remote Access role in Windows Server from 2008 R2, provides seamless and transparent always-on remote network connectivity for managed (domain-joined) Windows clients. [2]
  • 3. It provides wide connectivity and access to internal applications and data, and does so without requiring any user interaction. The solution allows remote workers to access internal resources in the same familiar way, regardless of their physical location, resulting in a superior remote access experience and increased productivity.[2] Direct Access client computers have consistent remote network access, enabling them to update group policy and check in with systems-management servers more consistently than traditional client-based VPN allows. Direct Access connections are also bidirectional, allowing IT administrators to proactively manage their field-based assets just as they do their on-premise systems. The end result is having fully managed and secure mobile computers.[2] Direct Access is structured deployed Windows platform technologies such as Active Directory Domain Services (AD DS) and Group Policy, Active Directory Certificate Services (AD CS), and IPsec. Direct Access also based heavily on IPv6.[2] Seamless and Transparent: Direct Access is a paradigm shift in the way corporate IT provides secure remote access. Unlike traditional VPN, which is user initiated, Direct Access works at the machine level to provide seamless and transparent, always-on secure remote corporate network connectivity any time the computer has an active Internet connection. Because it requires no user interaction, it streamlines and simplifies the remote access experience for the end user.[2] Bi-directional: Direct Access is also bi-directional, which is a key differentiator between it and VPN. The bi-directional nature of Direct Access enables some interesting new use cases for secure remote access. For example, an administrator on the corporate network can initiate a remote desktop connection to a remotely connected Direct Access client for the purposes of troubleshooting or providing assistance. Configuration and software can be deployed to Direct Access clients using System Center Configuration Manager (SCCM) , and vulnerability scans can be performed remotely.[2] Direct Access vs. VPN VPN connections are user initiated and therefore optional. It is up to the user to decide when they want to connect to the corporate network. By comparison, Direct Access is seamless and transparent in nature, is completely automatic, and requires no user interaction to establish a connection. [2] Many VPN protocols aren’t firewall friendly, which can impede the successful establishment of a VPN connection. Direct Access can establish its secure remote connection using HTTPS, which is commonly allowed through most firewalls. [2]
  • 4. VPNs often require investments in proprietary hardware and per-user licensing. Direct Access can be deployed on existing virtual infrastructure and does not require additional user licensing. [2] Proprietary software is commonly required to leverage all of the features provided by VPN solutions. This software must be deployed and managed by IT administrators. DirectAccess requires no additional third-party software to be installed. All settings for DirectAccess are managed through Group Policy Objects (GPOs) in Active Directory. [2] A VPN connection can be established from any client machine with the VPN client software installed. This makes integration with a multifactor authentication solution an essential requirement, which makes the solution more complex and difficult to support. A Direct Access connection can only be established from a client computer that has been provisioned for Direct Access by IT, reducing the need to employ strong authentication for Direct Access connections. [2] 4.Conclusion: In this work we gained some information about traditional VPN, and Direct access technology ,and make a small compared on them, and from these information's we can say that the direct access technology may be better solution than traditional remote access VPN. 5.References: Papers: [1] Nepal, s.,& Bhattarai, S. (2016). VPN research, 1-10. DOI: 10.13140/RG.2.1.4215.8160 Books: [2] Richard M. Hicks. (2016). "Implementing DirectAccess with Windows Server 2016" , 1-296. DOI 10.1007/978-1-4842-2059-7