SlideShare une entreprise Scribd logo
1  sur  43
Remote Access Service HCL CDC Etawah
Contents for Remote Access Service: 1. What is Remote Access Service (RAS) and its Types ? 2. RAS Client Supported Connection Type  3. RAS Supporting Clients 4. Required RAS Server components 5. RAS Client supported Connection, Transport Authentication, VPN, and Bandwidth Protocols 6. Working with RAS
What is Remote Access? ,[object Object]
Employees can then use all the resources that would be available from the office desktop computer.,[object Object]
Type 1: Dial-up Remote Access A dial-up remote access connection comprises remote access clients, a remote access server (RAS), and some telecommunication infrastructure (typically, an analog phone line). A remote client uses the telecommunication infrastructure to create a temporary physical or virtual circuit to a port on the RAS. After the circuit is created, the connection parameters are set. If RAS and remote access clients are not located in a local telecommunication boundary, incremental long distance charges are incurred. Even though it has limited scalability, this solution is good for corporations that have a low requirement for remote access.  Type 2: VPN Remote Access A VPN remote access connection between a user and the enterprise data center consists of a VPN client, a VPN device or server, and the Internet. When a client accesses the Internet through a local ISP, a virtual point-to-point connection is created with a RAS acting as the VPN server. Once this connection is created, the parameters for the VPN connection can be set and a VPN tunnel established with the VPN device or server to access enterprise resources. In this case, the client is not required to dial long distance.
RAS Supported Connection Type: 1. Public Switched Telephone Network (PSTN) 2. Integrated Service Digital Network (ISDN) 3. X.25 4. Asynchronous Transfer Mode (ATM) over Asymmetric Digital Subscriber Line (ADSL) 5. Digital Links and V.90 6.VPN Connection
 Public Switched Telephone Network  (PSTN):
Integrated Services Digital Network (ISDN):
X.25
Asynchronous Transfer Mode (ATM) over Asymmetric Digital Subscriber Line (ADSL)
Digital Links and V.90:
VPN Connection For RAS:
RAS Supporting Clients: 1. TCP/IP Clients using PPP 2. LAN Manager 3. DOS RAS 4. Windows for Workgroups 5. Windows 95/98 6.Windows NT 3.1 and above 7. Windows 2000/Xp
Required RAS Server Components: 1. Modem 2. ISDN Interface or 3. X.25 PAD 4. ATM or
Networking:
Routing And Remote Access Server (RRAS):
RAS Supported Connection Protocols: 1. Point to Point Protocol (PPP) 2. Serial Line Internet Protocol (SLIP) 3. Compressed SLIP (CSLIP) 4. Point to Point Multilink Protocol (PPMP) 5. Microsoft RAS or AsyBEUI 6. Callback Control Protocol (CBCP)
Point to Point Protocol (PPP): PPP (Point-to-Point Protocol) is designed for simple links which transport packets between two peers. These links provide full-duplex simultaneous bi-directional operation and are assumed to deliver packets in order. PPP provides a common solution for the easy connection of a wide variety of hosts, bridges and routers.
Serial Line Internet Protocol (SLIP): The Serial Line Internet Protocol is an encapsulation of the Internet Protocol designed to work over Serial Ports and Modem Connections. SLIP has been largely replaced by the Point to Point Protocol. SLIP will only support transport of IP Packets.
Compressed SLIP (CSLIP): CSLIP is essentially for data compression of the SLIP Protocol. It reduce packet overhead drastically. It requires CSLIP support on both the Client and Server ends. This may also be used with PPP and called CPPP.
Point to Point Multilink Protocol: Point to Point Multilink Protocol is a variation on the PPP that makes it possible to deploy multiple Physical Layer Connections and have them  perceived as a single data link layer Connection by the upper layer protocols. It is typically used as a bandwidth-on-demand technique. Or combines bandwidth  from several physical connections into one logical connection.
Microsoft RAS or AsyBEUI: It was not technically possible for an AsyBEUI client to "bridge" to IPX/SPX and talk NCPs to a NetWare server for resource sharing. Then AsyBEUI make the RAS server would pick up the traffic and send it to the IPX/SPX stack using its NetBIOS interface capability. This allowed you to use IPX/SPX as the protocol between two Windows NT machines. Or  AsyBEUI Client can now bridge to IPX/SPX and talk to Server.
Callback Control Protocol (CBCP): It allows the server to negotiate with the Client to call the Client back to establish the connection. CBCP negotiates the use of callback where the remote access server, after authenticating the remote access client, terminates the physical connection, waits a specified amount of time, and then calls the remote access client back at either a static or dynamically configured phone number. Common CBCP options include the phone number being used by the remote access server to call the remote access client back.
RAS Client Transport Protocols: 1. NetBIOS Extended User Interface (NetBEUI) 2.  Internetwork Packet Exchange/Sequence Packet Exchange (IPX/SPX- NWLink) 3. Transmission Control Protocol/ Internet Protocol (TCP/IP) 4. AppleTalk
NetBIOS Extended User Interface (NetBEUI): It is an enhanced version of the NetBIOS Protocol. It is used by Network Operating Systems such as LAN Manager, LAN Server, Windows for Workgroups, Windows95 and Windows NT. NetBEUI was originally designed by IBM for their LAN Manager server and later extended by Microsoft and Novell. It is easy to configure and faster.
Internetwork Packet Exchange/ Sequence Packet Exchange (IPX/SPX- NWLink): NWLink is Microsoft’s implementation of Novell’s IPX/SPX/NetBIOS Protocols. IPX is Novell’s implementation of the Xerox Internet Datagram Protocol. IPX is a connectionless datagram protocol that delivers packets across the Internet. SPX is Novell’s version of the Xerox Sequenced Packet Protocol. It is a transport layer protocol providing a packet delivery service for third party applications.
Transmission Control Protocol/ Internet Protocol (TCP/IP): The TCP/IP suite of protocols is the set of protocols used to communicate  across the internet.  TCP provides a reliable stream delivery and virtual connection service to applications through the use of sequenced acknowledgment with retransmission of packets when necessary. IP is the routing layer datagram service of the TCP/IP suite. All other protocols within the TCP/IP suite, except ARP and RARP, use IP to route frames from host to host. The IP frame header contains routing information and control information associated with datagram delivery.
AppleTalk: The Apple Talk Protocol suite includes the following protocols:
RAS Supported Authentication Protocols: 1. Password Authentication Protocol (PAP) 2. Challenge Handshake Authentication Protocol (CHAP) 3. Microsoft CHAP (MS-CHAP) or MD5 4. Remote Authentication Dial-In User Service (RADIUS) 5. Extensible Authentication Protocol (EAP)
Password Authentication Protocol (PAP): Password Authentication Protocol provides a simple method for the peer to establish its identity using a 2-way handshake. The PAP packet is encapsulated in the Information field of a PPP data link layer frame. Almost all Networking Operating System remote servers support PAP. ,[object Object]
Uses plain text passwords for authentication,[object Object]
Microsoft CHAP (MS-CHAP) or MD5: Microsoft version of RSA Message Digest 5 (MD5) challenge and reply protocol. It only works non Microsoft Systems and enables data encryption. Selecting this authentication method causes all data to be encrypted. It is provide an authenticator-controlled password change mechanism. And it is also provides an authenticator-controlled authentication retry mechanism. It is defines failure codes returned in the Failure packet message field.
Remote Authentication Dial-In User Service (RADIUS): Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use a network service.  RADIUS serves three functions: 1. Authenticate Users or Devices before granting them access to a Network. 2. Authorize those Users or Devices for certain Network Services. 3. Account for usage of those services.
Extensible Authentication Protocol (EAP): The Extensible Authentication Protocol (EAP) is best considered as a framework for transporting authentication protocols, rather than as an authentication protocol itself. EAP can be used for authenticating Wireless, Dial-up and VPN connections, and also Local Area Network (LAN) ports in conjunction with IEEE 802.1X. EAP is used between a dial-in Client and Server  to determine what authentication protocol will be used.
RAS Supported VPN Protocols: 1. Point to Point Tunneling  Protocol (PPTP) 2. Layer Two Tunneling Protocol (L2TP) 3. Internet Protocol Security (IPSec)
Point to Point Tunneling  Protocol (PPTP): PPTP works at the Link Layer. No encryption or key management included in specifications. A VPN tunneling Protocol used to send secure communications from point to point. It is used to access a network through the network using the speed of modem. It uses PPP encryption or Microsoft Point to Point Encryption over TCP as a transport Protocol.
Layer Two Tunneling Protocol (L2TP): L2TP combines features of L2F and PPTP and it is works on the Link Layer. No encryption or key management is included in specifications. It uses IPSec for encryption.
Internet Protocol Security (IPSec): IPSec works on Layer 3. It is a collection of security measures that address data privacy, integrity, authentication, and key management, in addition to tunneling. IPSec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet.
RAS Supported Bandwidth Allocation Protocols: 1. Bandwidth Allocation Control Protocol (BACP) 2. Bandwidth Allocation Protocol (BAP)
Bandwidth Allocation Control Protocol (BACP): BACP is an Internet protocol that helps users manage a combination of dial-up links, usually over ISDN connections.  BACP provides what is called dial on demand (or bandwidth on demand), a technique for providing additional bandwidth as needed by combining two or more circuits into a single circuit with a higher data throughput rate. The technique is useful for accommodating bursts in traffic, videoconferencing, backup sessions, and other requirements. You use dial on demand to automatically combine channels when data traffic increases beyond the capacity of a single channel.
Bandwidth Allocation Protocol (BAP): The Bandwidth Allocation Protocol (BAP) manages the number of links in a multilink bundle. BAP defines datagram's to coordinate adding and removing individual links in a multilink bundle, as well as specifying which peer is responsible for decisions regarding managing bandwidth during a multilink connection.
Remote Access for a Client: Login Window for RAS
Thank You By- Apoorw Pandey apoorw.hcle@gmail.com

Contenu connexe

Tendances

Tendances (20)

Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
IP Address
IP AddressIP Address
IP Address
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Subnetting
SubnettingSubnetting
Subnetting
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
WLAN
WLANWLAN
WLAN
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domain
 
Network cable
Network cableNetwork cable
Network cable
 
Wireshark Basic Presentation
Wireshark Basic PresentationWireshark Basic Presentation
Wireshark Basic Presentation
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 

En vedette

En vedette (20)

Remote Access
Remote AccessRemote Access
Remote Access
 
Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone ppt
 
Remote access connection
Remote access connection Remote access connection
Remote access connection
 
Controlling remote pc using mobile
Controlling remote pc using mobileControlling remote pc using mobile
Controlling remote pc using mobile
 
Remote desktop connection
Remote desktop connectionRemote desktop connection
Remote desktop connection
 
Remote Login
Remote LoginRemote Login
Remote Login
 
Seminar 2 ppt
Seminar 2 pptSeminar 2 ppt
Seminar 2 ppt
 
TeamViewer
TeamViewerTeamViewer
TeamViewer
 
Remote Web Desk
Remote Web DeskRemote Web Desk
Remote Web Desk
 
Chapter 2 point-to-point protocol (ppp)
Chapter 2   point-to-point protocol (ppp)Chapter 2   point-to-point protocol (ppp)
Chapter 2 point-to-point protocol (ppp)
 
Teamviewer
Teamviewer Teamviewer
Teamviewer
 
Remote Desktop Services and Virtual Desktop infrastructure in Windows Server ...
Remote Desktop Services and Virtual Desktop infrastructure in Windows Server ...Remote Desktop Services and Virtual Desktop infrastructure in Windows Server ...
Remote Desktop Services and Virtual Desktop infrastructure in Windows Server ...
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Squid
SquidSquid
Squid
 
Domain name system
Domain name systemDomain name system
Domain name system
 
3 g and 4g final ppt
3 g and 4g final ppt3 g and 4g final ppt
3 g and 4g final ppt
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
4g wireless final ppt
4g wireless  final ppt4g wireless  final ppt
4g wireless final ppt
 
Dns ppt
Dns pptDns ppt
Dns ppt
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 

Similaire à Remote Access Service Overview

Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxbartholomeocoombs
 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxLeahRachael
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network priya sehgal
 
Radius Protocol
Radius ProtocolRadius Protocol
Radius ProtocolNetwax Lab
 
Ports and services
Ports and servicesPorts and services
Ports and servicesIlan Mindel
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
WebRTC Infrastructure Design
WebRTC Infrastructure DesignWebRTC Infrastructure Design
WebRTC Infrastructure DesignNeeraj Chandra
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.pptImXaib
 
authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)Azad Kaki
 
important network terminologies
important network terminologiesimportant network terminologies
important network terminologiesevelyn
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networksevelyn
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XIIDeepak Singh
 
DCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packetsDCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packetsrajshreemuthiah
 

Similaire à Remote Access Service Overview (20)

Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
C C N A Day5
C C N A  Day5C C N A  Day5
C C N A Day5
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Wan networks
Wan networksWan networks
Wan networks
 
Radius Protocol
Radius ProtocolRadius Protocol
Radius Protocol
 
Introduction to WAP
Introduction to WAPIntroduction to WAP
Introduction to WAP
 
Networking Brief Overview
Networking Brief OverviewNetworking Brief Overview
Networking Brief Overview
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
WebRTC Infrastructure Design
WebRTC Infrastructure DesignWebRTC Infrastructure Design
WebRTC Infrastructure Design
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
 
authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)
 
important network terminologies
important network terminologiesimportant network terminologies
important network terminologies
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networks
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
DCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packetsDCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packets
 

Remote Access Service Overview

  • 1. Remote Access Service HCL CDC Etawah
  • 2. Contents for Remote Access Service: 1. What is Remote Access Service (RAS) and its Types ? 2. RAS Client Supported Connection Type 3. RAS Supporting Clients 4. Required RAS Server components 5. RAS Client supported Connection, Transport Authentication, VPN, and Bandwidth Protocols 6. Working with RAS
  • 3.
  • 4.
  • 5. Type 1: Dial-up Remote Access A dial-up remote access connection comprises remote access clients, a remote access server (RAS), and some telecommunication infrastructure (typically, an analog phone line). A remote client uses the telecommunication infrastructure to create a temporary physical or virtual circuit to a port on the RAS. After the circuit is created, the connection parameters are set. If RAS and remote access clients are not located in a local telecommunication boundary, incremental long distance charges are incurred. Even though it has limited scalability, this solution is good for corporations that have a low requirement for remote access. Type 2: VPN Remote Access A VPN remote access connection between a user and the enterprise data center consists of a VPN client, a VPN device or server, and the Internet. When a client accesses the Internet through a local ISP, a virtual point-to-point connection is created with a RAS acting as the VPN server. Once this connection is created, the parameters for the VPN connection can be set and a VPN tunnel established with the VPN device or server to access enterprise resources. In this case, the client is not required to dial long distance.
  • 6. RAS Supported Connection Type: 1. Public Switched Telephone Network (PSTN) 2. Integrated Service Digital Network (ISDN) 3. X.25 4. Asynchronous Transfer Mode (ATM) over Asymmetric Digital Subscriber Line (ADSL) 5. Digital Links and V.90 6.VPN Connection
  • 7. Public Switched Telephone Network (PSTN):
  • 8. Integrated Services Digital Network (ISDN):
  • 10. Asynchronous Transfer Mode (ATM) over Asymmetric Digital Subscriber Line (ADSL)
  • 13. RAS Supporting Clients: 1. TCP/IP Clients using PPP 2. LAN Manager 3. DOS RAS 4. Windows for Workgroups 5. Windows 95/98 6.Windows NT 3.1 and above 7. Windows 2000/Xp
  • 14. Required RAS Server Components: 1. Modem 2. ISDN Interface or 3. X.25 PAD 4. ATM or
  • 16. Routing And Remote Access Server (RRAS):
  • 17. RAS Supported Connection Protocols: 1. Point to Point Protocol (PPP) 2. Serial Line Internet Protocol (SLIP) 3. Compressed SLIP (CSLIP) 4. Point to Point Multilink Protocol (PPMP) 5. Microsoft RAS or AsyBEUI 6. Callback Control Protocol (CBCP)
  • 18. Point to Point Protocol (PPP): PPP (Point-to-Point Protocol) is designed for simple links which transport packets between two peers. These links provide full-duplex simultaneous bi-directional operation and are assumed to deliver packets in order. PPP provides a common solution for the easy connection of a wide variety of hosts, bridges and routers.
  • 19. Serial Line Internet Protocol (SLIP): The Serial Line Internet Protocol is an encapsulation of the Internet Protocol designed to work over Serial Ports and Modem Connections. SLIP has been largely replaced by the Point to Point Protocol. SLIP will only support transport of IP Packets.
  • 20. Compressed SLIP (CSLIP): CSLIP is essentially for data compression of the SLIP Protocol. It reduce packet overhead drastically. It requires CSLIP support on both the Client and Server ends. This may also be used with PPP and called CPPP.
  • 21. Point to Point Multilink Protocol: Point to Point Multilink Protocol is a variation on the PPP that makes it possible to deploy multiple Physical Layer Connections and have them perceived as a single data link layer Connection by the upper layer protocols. It is typically used as a bandwidth-on-demand technique. Or combines bandwidth from several physical connections into one logical connection.
  • 22. Microsoft RAS or AsyBEUI: It was not technically possible for an AsyBEUI client to "bridge" to IPX/SPX and talk NCPs to a NetWare server for resource sharing. Then AsyBEUI make the RAS server would pick up the traffic and send it to the IPX/SPX stack using its NetBIOS interface capability. This allowed you to use IPX/SPX as the protocol between two Windows NT machines. Or AsyBEUI Client can now bridge to IPX/SPX and talk to Server.
  • 23. Callback Control Protocol (CBCP): It allows the server to negotiate with the Client to call the Client back to establish the connection. CBCP negotiates the use of callback where the remote access server, after authenticating the remote access client, terminates the physical connection, waits a specified amount of time, and then calls the remote access client back at either a static or dynamically configured phone number. Common CBCP options include the phone number being used by the remote access server to call the remote access client back.
  • 24. RAS Client Transport Protocols: 1. NetBIOS Extended User Interface (NetBEUI) 2. Internetwork Packet Exchange/Sequence Packet Exchange (IPX/SPX- NWLink) 3. Transmission Control Protocol/ Internet Protocol (TCP/IP) 4. AppleTalk
  • 25. NetBIOS Extended User Interface (NetBEUI): It is an enhanced version of the NetBIOS Protocol. It is used by Network Operating Systems such as LAN Manager, LAN Server, Windows for Workgroups, Windows95 and Windows NT. NetBEUI was originally designed by IBM for their LAN Manager server and later extended by Microsoft and Novell. It is easy to configure and faster.
  • 26. Internetwork Packet Exchange/ Sequence Packet Exchange (IPX/SPX- NWLink): NWLink is Microsoft’s implementation of Novell’s IPX/SPX/NetBIOS Protocols. IPX is Novell’s implementation of the Xerox Internet Datagram Protocol. IPX is a connectionless datagram protocol that delivers packets across the Internet. SPX is Novell’s version of the Xerox Sequenced Packet Protocol. It is a transport layer protocol providing a packet delivery service for third party applications.
  • 27. Transmission Control Protocol/ Internet Protocol (TCP/IP): The TCP/IP suite of protocols is the set of protocols used to communicate across the internet. TCP provides a reliable stream delivery and virtual connection service to applications through the use of sequenced acknowledgment with retransmission of packets when necessary. IP is the routing layer datagram service of the TCP/IP suite. All other protocols within the TCP/IP suite, except ARP and RARP, use IP to route frames from host to host. The IP frame header contains routing information and control information associated with datagram delivery.
  • 28. AppleTalk: The Apple Talk Protocol suite includes the following protocols:
  • 29. RAS Supported Authentication Protocols: 1. Password Authentication Protocol (PAP) 2. Challenge Handshake Authentication Protocol (CHAP) 3. Microsoft CHAP (MS-CHAP) or MD5 4. Remote Authentication Dial-In User Service (RADIUS) 5. Extensible Authentication Protocol (EAP)
  • 30.
  • 31.
  • 32. Microsoft CHAP (MS-CHAP) or MD5: Microsoft version of RSA Message Digest 5 (MD5) challenge and reply protocol. It only works non Microsoft Systems and enables data encryption. Selecting this authentication method causes all data to be encrypted. It is provide an authenticator-controlled password change mechanism. And it is also provides an authenticator-controlled authentication retry mechanism. It is defines failure codes returned in the Failure packet message field.
  • 33. Remote Authentication Dial-In User Service (RADIUS): Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use a network service. RADIUS serves three functions: 1. Authenticate Users or Devices before granting them access to a Network. 2. Authorize those Users or Devices for certain Network Services. 3. Account for usage of those services.
  • 34. Extensible Authentication Protocol (EAP): The Extensible Authentication Protocol (EAP) is best considered as a framework for transporting authentication protocols, rather than as an authentication protocol itself. EAP can be used for authenticating Wireless, Dial-up and VPN connections, and also Local Area Network (LAN) ports in conjunction with IEEE 802.1X. EAP is used between a dial-in Client and Server to determine what authentication protocol will be used.
  • 35. RAS Supported VPN Protocols: 1. Point to Point Tunneling Protocol (PPTP) 2. Layer Two Tunneling Protocol (L2TP) 3. Internet Protocol Security (IPSec)
  • 36. Point to Point Tunneling Protocol (PPTP): PPTP works at the Link Layer. No encryption or key management included in specifications. A VPN tunneling Protocol used to send secure communications from point to point. It is used to access a network through the network using the speed of modem. It uses PPP encryption or Microsoft Point to Point Encryption over TCP as a transport Protocol.
  • 37. Layer Two Tunneling Protocol (L2TP): L2TP combines features of L2F and PPTP and it is works on the Link Layer. No encryption or key management is included in specifications. It uses IPSec for encryption.
  • 38. Internet Protocol Security (IPSec): IPSec works on Layer 3. It is a collection of security measures that address data privacy, integrity, authentication, and key management, in addition to tunneling. IPSec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet.
  • 39. RAS Supported Bandwidth Allocation Protocols: 1. Bandwidth Allocation Control Protocol (BACP) 2. Bandwidth Allocation Protocol (BAP)
  • 40. Bandwidth Allocation Control Protocol (BACP): BACP is an Internet protocol that helps users manage a combination of dial-up links, usually over ISDN connections. BACP provides what is called dial on demand (or bandwidth on demand), a technique for providing additional bandwidth as needed by combining two or more circuits into a single circuit with a higher data throughput rate. The technique is useful for accommodating bursts in traffic, videoconferencing, backup sessions, and other requirements. You use dial on demand to automatically combine channels when data traffic increases beyond the capacity of a single channel.
  • 41. Bandwidth Allocation Protocol (BAP): The Bandwidth Allocation Protocol (BAP) manages the number of links in a multilink bundle. BAP defines datagram's to coordinate adding and removing individual links in a multilink bundle, as well as specifying which peer is responsible for decisions regarding managing bandwidth during a multilink connection.
  • 42. Remote Access for a Client: Login Window for RAS
  • 43. Thank You By- Apoorw Pandey apoorw.hcle@gmail.com