尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Remote Access
Connection
Ah. Fawad ‘Saiq’
E-mail: ah.fawad.saiq@gmail.com
Cell : 0793026501
Remote and Dial-up Connections
 Remote Access connections
 Virtual Private Networks
 Authentication Protocols and encryption
 Inbound Connections
We have two method for establish of remote access connection
Remote Access connections:
Dial-up PPP
Broadband TCP/IP
Remote and Dial-up Connections
is a form of Internet access that uses the facilities of the public
switched telephone network (PSTN) to establish a dialed connection
to an Internet service provider (ISP) via telephone lines. The user's
computer or router uses an attached modem to encode and decode
Internet Protocol packets and control information into and from
analogue audio frequency signals, respectively.
Dial-up Internet Access
Dial-up Connection
Dial-up Internet Access
Dial-up Internet Access
Dial-up Internet Access
Dial-up Internet Access
Dial-up Internet Access
Dial-up Internet Access
Broadband Internet Access
Broadband Internet service truly is the most used form of Internet access
because of its high access speeds; it is offered in four different forms, DSL
(or Digital Subscriber Line), also fiber-optic, cable, and satellite.
The old dial-up connection is the only non-broadband internet service available,
and even though it is cheaper, most Internet users are moving towards the
faster broadband Internet connection.
Categories of Unshielded Twisted Pair
Our company has a remote access server connection and we want to connect
Remotely making connection
VPN is special type for WAN(Wide Area Network) which achieves to connect
without use leased private lines. It uses to establish Internet.
Development of VPN is to establish secure and cost effective long distance links
between two or more computing networks.
VPN has its own set of software programs, protocols and security constructs
which make secure connectivity possible.
The USP of virtual private computer networks over conventional computer
networks lies in the fact that this technology is a significantly low cost alternative.
VPN (virtual Private Network)
VPN (virtual Private Network)
1. Remote client access via VPN
2. Peer to peer VPN (can let two separate local area networks, to be linked
together)
3. Private VPN (private intranet of a company that allows enabling of access
control for each user)
VPN (virtual Private Network)
Types of VPN
How VPN Works
Install VPN client programs on the machines which need remote access
Enable Internet connectivity provided by an ISP, after verification of user name
and password.
Access the private network easily use client remote computer.
VPN (virtual Private Network)
Benefit of VPN
Substantially easy and inexpensive to set it up
Can provide long distance connectivity, between multiple branches of a company
office, by providing secure data transfer and encryption, to enable video
conferencing, as well as data transfer.
Reduces the costs involved in maintaining long distance networks and costs of
operation.
VPN is a technology that are really cost effectiveness, efficiency and security
features of virtual private networks make them attractive and preferred choices
over conventional leased line based networks. Because of that, most industry
Intranets use VPN technology to establish internal connectivity.
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
VPN (virtual Private Network)
DOMAIN
VPN (virtual Private Network)
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Configuring VPN Protocols
Authentication Protocols
PPP uses two authentication protocols PAP and CHAP.
CHAP is the preferred protocol, because CHAP uses 3-way handshake;
whereas, PAP uses 2-way handshake.
CHAP is an authentication scheme used by Point to Point Protocol (PPP)
servers to validate the identity of remote clients.
CHAP provides better security as compared to Password Authentication
Protocol (PAP). The protocol exists in two versions,
MS-CHAPv1 and MS-CHAPv2
Authentication Protocols
PAP : Sends username and password In clear text
SPAP : shiva LAN Rover client encrypts password but not data
Challenge-Handshake Authentication Protocol (CHAP):
encrypt username and password but not data , for non-Microsoft
operating systems
Ms-CHAP1 : one way password encryption
Ms-CHAP2 :mutual authentication , stronger encryption .(NT+98,VPN only)
Inbound Connections
Inbound connections are one of the types of network connections
created using the New Connection Wizard.
Inbound Connections
Inbound Connections
Inbound Connections
Inbound Connections
Inbound Connections
Remote access connection

More Related Content

What's hot

Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
Atika Zaimi
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
SaranyaK68
 
Seminar 2 ppt
Seminar 2 pptSeminar 2 ppt
Seminar 2 ppt
sathya5691
 
Ccna 1 final
Ccna 1  finalCcna 1  final
Ccna 1 final
Vahdet Shehu
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
Daniel Vinyar
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
kamran_share
 
Certified Hospitality Technology Professional
Certified Hospitality Technology ProfessionalCertified Hospitality Technology Professional
Certified Hospitality Technology Professional
Huy Pham
 
Remote Web Desk
Remote Web DeskRemote Web Desk
Remote Web Desk
Satish Chandra
 
Vpn
VpnVpn
Mpls vpn
Mpls vpnMpls vpn
Mpls vpn
rel comm
 
Tcp ip
Tcp ipTcp ip
Tcp ip
Apratim Saha
 
Vo lte white paper
Vo lte   white paperVo lte   white paper
Vo lte white paper
Muhammad Rauf Akram
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Peter R. Egli
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.
igede tirtanata
 
Mobile IP
Mobile IPMobile IP
Mobile IP
Mukesh Chinta
 
802.1x
802.1x802.1x
802.1x
akruthi k
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
LivePerson
 
Remote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile PhoneRemote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile Phone
Chhatrapati shivaji institute of technology, Deori
 
Powerpoint exam
Powerpoint examPowerpoint exam
Powerpoint exam
papapapogi
 

What's hot (19)

Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
Seminar 2 ppt
Seminar 2 pptSeminar 2 ppt
Seminar 2 ppt
 
Ccna 1 final
Ccna 1  finalCcna 1  final
Ccna 1 final
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Certified Hospitality Technology Professional
Certified Hospitality Technology ProfessionalCertified Hospitality Technology Professional
Certified Hospitality Technology Professional
 
Remote Web Desk
Remote Web DeskRemote Web Desk
Remote Web Desk
 
Vpn
VpnVpn
Vpn
 
Mpls vpn
Mpls vpnMpls vpn
Mpls vpn
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Vo lte white paper
Vo lte   white paperVo lte   white paper
Vo lte white paper
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
802.1x
802.1x802.1x
802.1x
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
 
Remote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile PhoneRemote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile Phone
 
Powerpoint exam
Powerpoint examPowerpoint exam
Powerpoint exam
 

Viewers also liked

Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone ppt
Laxman Puri
 
Windows 10 – 8 Tips & Tricks
Windows 10 – 8 Tips & TricksWindows 10 – 8 Tips & Tricks
Windows 10 – 8 Tips & Tricks
Individual Software
 
User Account Control Prensentation2
User Account Control Prensentation2User Account Control Prensentation2
User Account Control Prensentation2
wsolomoniv
 
Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10
Individual Software
 
Remote management, LDP SoftServe
Remote management, LDP SoftServeRemote management, LDP SoftServe
Remote management, LDP SoftServe
Petro Porchuk
 
Difference between windows 7 and windows 8 and windows 8 features
 Difference between windows 7 and windows 8 and windows 8 features Difference between windows 7 and windows 8 and windows 8 features
Difference between windows 7 and windows 8 and windows 8 features
Rizwan Ansari
 
Castle scramble
Castle scrambleCastle scramble
Castle scramble
Damien Beckinger
 
windows7 vs windows8 ppt
windows7 vs windows8 ppt windows7 vs windows8 ppt
windows7 vs windows8 ppt
KUMAR V S
 
ScienceShare.co.uk Shared Resource
ScienceShare.co.uk Shared ResourceScienceShare.co.uk Shared Resource
ScienceShare.co.uk Shared Resource
ScienceShare.co.uk
 
Unscrambler Project
Unscrambler ProjectUnscrambler Project
Unscrambler Project
Hal Kinsey III, E.I.
 
Remote Login
Remote LoginRemote Login
Remote Login
hariprasadnr
 
The Remote Access feature of Tally ERP 9
The Remote Access feature of Tally ERP 9The Remote Access feature of Tally ERP 9
The Remote Access feature of Tally ERP 9
YENNES Infotec (P) Limited
 
Windows 10: The Top Features!
Windows 10: The Top Features!Windows 10: The Top Features!
Windows 10: The Top Features!
Total Toolbar
 
Windows 8 vs windows 7 ppt
Windows 8 vs windows 7 pptWindows 8 vs windows 7 ppt
Windows 8 vs windows 7 ppt
Diya Mirza
 
Windows 7 Security
Windows 7 SecurityWindows 7 Security
Windows 7 Security
Jorge Orchilles
 
Window 10 ppt
Window 10 pptWindow 10 ppt
Window 10 ppt
Monu Jangid
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
Svetlin Nakov
 
Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8
Vibhanshu Chaturvedi
 
Chemometric analysis of data using “unscrambler x”
Chemometric analysis of data using “unscrambler x”Chemometric analysis of data using “unscrambler x”
Chemometric analysis of data using “unscrambler x”
nishidh41
 

Viewers also liked (19)

Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone ppt
 
Windows 10 – 8 Tips & Tricks
Windows 10 – 8 Tips & TricksWindows 10 – 8 Tips & Tricks
Windows 10 – 8 Tips & Tricks
 
User Account Control Prensentation2
User Account Control Prensentation2User Account Control Prensentation2
User Account Control Prensentation2
 
Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10
 
Remote management, LDP SoftServe
Remote management, LDP SoftServeRemote management, LDP SoftServe
Remote management, LDP SoftServe
 
Difference between windows 7 and windows 8 and windows 8 features
 Difference between windows 7 and windows 8 and windows 8 features Difference between windows 7 and windows 8 and windows 8 features
Difference between windows 7 and windows 8 and windows 8 features
 
Castle scramble
Castle scrambleCastle scramble
Castle scramble
 
windows7 vs windows8 ppt
windows7 vs windows8 ppt windows7 vs windows8 ppt
windows7 vs windows8 ppt
 
ScienceShare.co.uk Shared Resource
ScienceShare.co.uk Shared ResourceScienceShare.co.uk Shared Resource
ScienceShare.co.uk Shared Resource
 
Unscrambler Project
Unscrambler ProjectUnscrambler Project
Unscrambler Project
 
Remote Login
Remote LoginRemote Login
Remote Login
 
The Remote Access feature of Tally ERP 9
The Remote Access feature of Tally ERP 9The Remote Access feature of Tally ERP 9
The Remote Access feature of Tally ERP 9
 
Windows 10: The Top Features!
Windows 10: The Top Features!Windows 10: The Top Features!
Windows 10: The Top Features!
 
Windows 8 vs windows 7 ppt
Windows 8 vs windows 7 pptWindows 8 vs windows 7 ppt
Windows 8 vs windows 7 ppt
 
Windows 7 Security
Windows 7 SecurityWindows 7 Security
Windows 7 Security
 
Window 10 ppt
Window 10 pptWindow 10 ppt
Window 10 ppt
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8
 
Chemometric analysis of data using “unscrambler x”
Chemometric analysis of data using “unscrambler x”Chemometric analysis of data using “unscrambler x”
Chemometric analysis of data using “unscrambler x”
 

Similar to Remote access connection

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Richa Singh
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
Swarup Kumar Mall
 
vpn
vpnvpn
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala
 
Vpn
Vpn Vpn
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
AamirAziz
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
Abhinav Dwivedi
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
Rajesh Thakur
 
VirtualPrivateNetwork.ppt
VirtualPrivateNetwork.pptVirtualPrivateNetwork.ppt
VirtualPrivateNetwork.ppt
tahaniali27
 
About vpn network .ppt
About vpn network .pptAbout vpn network .ppt
About vpn network .ppt
shanbelayayu
 
VPN mean .ppt
VPN mean .pptVPN mean .ppt
VPN mean .ppt
shanbelayayu
 
Virtual Private Network Presentation.ppt
Virtual Private Network Presentation.pptVirtual Private Network Presentation.ppt
Virtual Private Network Presentation.ppt
mocec17097
 
VirtualPrivateNetwork PRESENTED BY RACHNA AGARWALL
VirtualPrivateNetwork PRESENTED BY RACHNA AGARWALLVirtualPrivateNetwork PRESENTED BY RACHNA AGARWALL
VirtualPrivateNetwork PRESENTED BY RACHNA AGARWALL
tgmrcr
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
Sleek International
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
Nikhil Kumar
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
Shreyank Gupta
 
VPN
VPN VPN
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
Swarup Kumar Mall
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
HirazNor
 

Similar to Remote access connection (20)

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
vpn
vpnvpn
vpn
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Vpn
Vpn Vpn
Vpn
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
VirtualPrivateNetwork.ppt
VirtualPrivateNetwork.pptVirtualPrivateNetwork.ppt
VirtualPrivateNetwork.ppt
 
About vpn network .ppt
About vpn network .pptAbout vpn network .ppt
About vpn network .ppt
 
VPN mean .ppt
VPN mean .pptVPN mean .ppt
VPN mean .ppt
 
Virtual Private Network Presentation.ppt
Virtual Private Network Presentation.pptVirtual Private Network Presentation.ppt
Virtual Private Network Presentation.ppt
 
VirtualPrivateNetwork PRESENTED BY RACHNA AGARWALL
VirtualPrivateNetwork PRESENTED BY RACHNA AGARWALLVirtualPrivateNetwork PRESENTED BY RACHNA AGARWALL
VirtualPrivateNetwork PRESENTED BY RACHNA AGARWALL
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
VPN
VPN VPN
VPN
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 

Recently uploaded

So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
ScyllaDB
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
Cynthia Thomas
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
dipikamodels1
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
UiPathCommunity
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
ScyllaDB
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
UmmeSalmaM1
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
ScyllaDB
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
Enterprise Knowledge
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
Neeraj Kumar Singh
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
ThousandEyes
 

Recently uploaded (20)

So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
 

Remote access connection

  • 1. Remote Access Connection Ah. Fawad ‘Saiq’ E-mail: ah.fawad.saiq@gmail.com Cell : 0793026501
  • 2. Remote and Dial-up Connections  Remote Access connections  Virtual Private Networks  Authentication Protocols and encryption  Inbound Connections
  • 3. We have two method for establish of remote access connection Remote Access connections: Dial-up PPP Broadband TCP/IP Remote and Dial-up Connections
  • 4. is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a dialed connection to an Internet service provider (ISP) via telephone lines. The user's computer or router uses an attached modem to encode and decode Internet Protocol packets and control information into and from analogue audio frequency signals, respectively. Dial-up Internet Access
  • 12. Broadband Internet Access Broadband Internet service truly is the most used form of Internet access because of its high access speeds; it is offered in four different forms, DSL (or Digital Subscriber Line), also fiber-optic, cable, and satellite. The old dial-up connection is the only non-broadband internet service available, and even though it is cheaper, most Internet users are moving towards the faster broadband Internet connection.
  • 13. Categories of Unshielded Twisted Pair Our company has a remote access server connection and we want to connect Remotely making connection
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. VPN is special type for WAN(Wide Area Network) which achieves to connect without use leased private lines. It uses to establish Internet. Development of VPN is to establish secure and cost effective long distance links between two or more computing networks. VPN has its own set of software programs, protocols and security constructs which make secure connectivity possible. The USP of virtual private computer networks over conventional computer networks lies in the fact that this technology is a significantly low cost alternative. VPN (virtual Private Network)
  • 24. 1. Remote client access via VPN 2. Peer to peer VPN (can let two separate local area networks, to be linked together) 3. Private VPN (private intranet of a company that allows enabling of access control for each user) VPN (virtual Private Network) Types of VPN
  • 25. How VPN Works Install VPN client programs on the machines which need remote access Enable Internet connectivity provided by an ISP, after verification of user name and password. Access the private network easily use client remote computer. VPN (virtual Private Network)
  • 26. Benefit of VPN Substantially easy and inexpensive to set it up Can provide long distance connectivity, between multiple branches of a company office, by providing secure data transfer and encryption, to enable video conferencing, as well as data transfer. Reduces the costs involved in maintaining long distance networks and costs of operation. VPN is a technology that are really cost effectiveness, efficiency and security features of virtual private networks make them attractive and preferred choices over conventional leased line based networks. Because of that, most industry Intranets use VPN technology to establish internal connectivity. VPN (virtual Private Network)
  • 32. VPN (virtual Private Network) DOMAIN
  • 41. Authentication Protocols PPP uses two authentication protocols PAP and CHAP. CHAP is the preferred protocol, because CHAP uses 3-way handshake; whereas, PAP uses 2-way handshake. CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP provides better security as compared to Password Authentication Protocol (PAP). The protocol exists in two versions, MS-CHAPv1 and MS-CHAPv2
  • 42. Authentication Protocols PAP : Sends username and password In clear text SPAP : shiva LAN Rover client encrypts password but not data Challenge-Handshake Authentication Protocol (CHAP): encrypt username and password but not data , for non-Microsoft operating systems Ms-CHAP1 : one way password encryption Ms-CHAP2 :mutual authentication , stronger encryption .(NT+98,VPN only)
  • 43. Inbound Connections Inbound connections are one of the types of network connections created using the New Connection Wizard.

Editor's Notes

  1. <Read the slide.>
  2. <Read the slide.>
  3. <Read the slide.>
  4. <Read the slide.>
  5. <Read the slide.>
  6. <Read the slide.>
  7. <Read the slide.>
  8. <Read the slide.>
  9. <Read the slide.>
  10. <Read the slide.>
  11. <Read the slide.>
  12. <Read the slide.>
  13. <Read the slide.>
  14. <Read the slide.>
  15. <Read the slide.>
  16. <Read the slide.>
  17. <Read the slide.>
  18. <Read the slide.>
  19. <Read the slide.>
  20. <Read the slide.>
  21. <Read the slide.>
  22. <Read the slide.>
  23. <Read the slide.>
  24. <Read the slide.>
  25. <Read the slide.>
  26. <Read the slide.>
  27. <Read the slide.>
  28. <Read the slide.>
  29. <Read the slide.>
  30. <Read the slide.>
  31. <Read the slide.>
  32. <Read the slide.>
  33. <Read the slide.>
  34. <Read the slide.>
  35. <Read the slide.>
  36. <Read the slide.>
  37. <Read the slide.>
  38. <Read the slide.>
  39. <Read the slide.>
  40. <Read the slide.>
  41. <Read the slide.>
  42. <Read the slide.>
  43. <Read the slide.>
  44. <Read the slide.>
  45. <Read the slide.>
  46. <Read the slide.>
  47. <Read the slide.>
  翻译: