IT tutorials
 
Windows
 

Windows 8 : Managing Mobile Networking and Remote Access - Understanding Mobile Networking and Remote Access

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
6/23/2013 7:29:39 PM

Although the underlying technologies are fundamentally different, direct-dial, broadband, VPN, and DirectAccess connections all make it possible for users to access your organization’s network remotely. With a typical direct-dial network configuration, off-site users use their computer’s modem and a standard telephone line to connect to a modem pool located at the office. A Windows server managing the modem pool and running Routing And Remote Access authenticates the logon ID and password and authorizes the user to connect to the internal network. The user can then access network resources just as she does when working on-site.

Figure 1 shows direct-dial connections using modem pools. Analog modems use dedicated telephone lines to connect users to the internal network at speeds up to 33.6 Kbps per line. Digital modems use channels of a T1 line to connect users to the internal network at speeds up to 56 Kbps per line. In a standard configuration, you might have 8, 12, or 16 modems configured in the pool, each with its own line (or channel). Typically, the modem pool has a lead number that users can call. This number connects to the first modem in the pool. When the lead number is busy, the line rolls over to the next number, which connects to the next modem in the pool, and so on, enabling users to dial a single number to gain access to all modems in the pool.

Use a dial-up connection to access an office network through a modem pool.

Figure 1. Use a dial-up connection to access an office network through a modem pool.

Unlike direct-dial connections, which can be made directly to the office network, broadband connections are made through an ISP’s network. The user’s DSL router, cable modem, or cellular modem establishes a connection to the ISP, which in turn connects the user to the public Internet. To connect to the office network, a broadband user must establish a VPN or DirectAccess connection between his computer and the office network. Figure 2 shows how VPN and DirectAccess work when the user has either a telephone line and DSL router or a cable and a cable modem.

A VPN is an extension of a private network across the public Internet. Once a user is connected, it appears to her that she is directly connected to the office network, and she can access network resources just as she does when working on-site. These seamless connections are possible because a virtual tunnel is established between the user’s computer and the office network, where the VPN technology takes care of routing information over the public Internet. One of two VPN technologies is typically used: Point-to-Point Tunneling Protocol (PPTP) or Layer 2 Tunneling Protocol (L2TP).

Use a virtual tunnel to access an office network.

Figure 2. Use a virtual tunnel to access an office network.

Both L2TP and PPTP offer encryption and protection from attacks, but only L2TP uses IPSec for advanced encryption, making it the more secure of the two technologies. Unfortunately, L2TP is more difficult to configure. When you use L2TP, you need to use Microsoft Certificate Services or a third-party certificate server to issue individual certificates for each system that will connect to the network using L2TP.

In addition to using a VPN with a broadband connection, you can use a VPN with a dial-up connection. In this configuration, users go through their ISP to establish a connection to the public Internet and then establish a private connection to the office network. When this configuration becomes standard procedure for dial-up users, your organization won’t need dedicated private lines like those reserved for a modem pool.

Another virtual tunneling option is DirectAccess. Although fundamentally different from VPN, the basic idea is the same—a DirectAccess connection is an extension of a private network across the public Internet. Once a user is connected (which happens automatically after the feature is enabled), it appears to him that he is directly connected to the office network, and he can access network resources just as he does when working on-site. These seamless connections are possible because a virtual tunnel is established between the user’s computer and the office network, where the DirectAccess technology takes care of routing information over the public Internet.

For Windows Server 2012, DirectAccess and Routing And Remote Access Service (RRAS) are combined into the Remote Access server role and the new implementation works differently than the original implementation for Windows Server 2008 Release 2. With the new implementation DirectAccess remains a client-server technology that relies on IPv6 and IPSec, but no longer requires Public Key Infrastructure (PKI). Although Windows Server 2008 R2 DirectAccess uses two IPSec tunnels to establish connectivity to the corporate network, Windows Server 2012 DirectAccess uses a single IPSec tunnel by default (because the standard implementation doesn’t rely on certificate-based authentication). However, for two-factor authentication, such as with smart cards and Network Access Protection (NAP) integration, you’ll need to deploy DirectAccess using two IPSec tunnels.

Windows Server 2012 DirectAccess supports multiple domains and has built-in support for network load balancing. Although DirectAccess clients communicate using IPv6 while connected remotely, the RemoteAccess server includes a built-in protocol translation (NAT64) and a name resolution gateway (DNS64) that can convert IPv6 communications from DirectAccess clients to IPv4 for internal servers. This allows DirectAccess clients to access IPv4-only intranet computers, but doesn’t allow IPv4-only intranet computers to initiate connections to DirectAccess clients. The reason for this is that network address translation is unidirectional and meant for communications initiated by DirectAccess clients.

Client computers must run the Enterprise edition of Windows 7 or later. Server computers must run Windows Server 2008 Release 2 or later. To use DirectAccess, you must set up and configure IPv6 for use by both client and server computers throughout the enterprise, including DNSv6 and DHCPv6 as appropriate.

In the Administrative Templates policies for Computer Configuration under Network\Network Connections, you can use the Route All Traffic Through The Internal Network policy to control how DirectAccess works. By default, when a user is connected to a workplace, the user’s computer accesses Internet resources directly rather than going through the workplace network. If you enable the routing policy, the user’s computer accesses the Internet through the workplace network.

Obviously, both configuration approaches have advantages and disadvantages. If you don’t route Internet traffic through the internal network, you reduce the workload and traffic levels on the workplace’s connection to the Internet but lose the additional security and safeguards that might be in place to protect the internal network. If you route Internet traffic through the internal network, you increase the workload and traffic levels on the workplace’s connection to the Internet, and possibly dramatically increase latency and response times when the user works with Internet resources, but you ensure that any additional security and safeguards in place to protect the internal network are also enforced.

 
Others
 
- Windows Small Business Server 2011 : Configuring Server Backups (part 2) - Modifying a Backup Job
- Windows Small Business Server 2011 : Configuring Server Backups (part 1) - Creating a Scheduled Backup Job
- Windows Small Business Server 2011 : Creating a Backup Strategy
- Windows 7 : Installing and Replacing Hardware - Installing and Using Multiple Monitors
- Windows 7 : Installing and Replacing Hardware - Adding Hardware
- Windows 7 : Installing and Replacing Hardware - Upgrading Your Hardware
- Windows Server 2008 : Compressing Files with compact, Encrypting Files with cipher
- Windows Server 2008 : Copying Files with copy, xcopy, and robocopy
- Windows Vista : Recovering Data (part 3) - Protecting a complete PC
- Windows Vista : Recovering Data (part 2) - Automating data protection
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us