Security+ Certification Training Kit (Pro-Certification)

Lesson 1: Understanding Remote Access Connectivity

One of your responsibilities as a network administrator is to provide connectivity to your network for users from remote locations. This might include remote offices as well as individual users who are connecting to the network from their homes or while traveling.


After this lesson, you will be able to

Estimated lesson time: 15 minutes


Two security concerns to consider when providing these connectivity solutions are how to manage devices not physically connected to your network and how to secure the communications link between the remote computer and your network. Because the remote computer might be a user's personal computer or device, and you might not have physical access to the system, the system might not be as secure as the computers directly attached to your network. Viruses can infect the remote system and spread to systems on your network, and possibly open an access point for hackers to exploit. You should be aware of the following when providing remote access:

Remote Connections

Telephone lines and the Internet are public communications mediums that hackers can exploit to take advantage of any weaknesses in your remote access or wireless access solution. There are several ways to provide remote connectivity to your network, but the communications medium choices for remote users are typically limited to access over telephone lines or across the Internet. Examples of remote connections include the following:

Once a remote user is connected, there are several ways to limit the resources he or she can access. In deciding what resources to provide access to, you need to balance the capabilities the remote users require, how secure the connection must be, and the cost of providing the secure solution. For instance, if all your remote users require only access to their corporate e-mail, you can configure a Web server to provide access to the e-mail using a Web browser. By configuring e-mail access through the Web browser, you don't have to open more ports through your firewall, and you can control how the users gain access. This also limits the access they have to other networked resources and allows you to provide a relatively inexpensive solution and mitigate many of the security risks.

To implement a cost-effective solution that provides the services your remote users require while maintaining security, you must understand the connectivity technology available along with the protocols and standards used. You also need to be aware of the security risks you must minimize.

Remote Connection Mediums

Telephone lines and the Internet are two communications mediums that are used by businesses to provide remote access capabilities. As shown in Figure 5-1, the remote access server can be made accessible by connecting telephone lines to modems, which are then managed by the remote access server, or the remote access server can be connected to the Internet in some manner. With both types of connections the user is required to form a connection, but the connection can be directly to a remote access server, or to the Internet (through a service provider) and then to the remote access server. Each type of connection is explained in greater detail in the following sections.

Figure 5-1. Two types of remote access server connectivity

The connection type depends on the high-speed connectivity solutions available, the cost of the service, and the reliability of the service. Each has strengths and weaknesses, costs and vulnerabilities, and security concerns that must be mitigated.

Telephone Connections

With telephone lines, modems are installed in a remote access server, telephone lines are connected, users are provided a telephone number, and they use a notebook computer, their home computer, or other dial-capable devices to gain access to the corporate network and its resources. Examples of protocols used with this type of connection include Serial Line Internet Protocol (SLIP) and Point-to-Point Protocol (PPP). PPP is the predominant protocol in use and it supports TCP/IP communications, authentication mechanisms, and several encryption methods.

When modems are used to connect to a remote access server, you can configure some additional features to provide connection-level security for your remote access clients. The Callback Control Protocol (CBCP) allows your remote access servers or clients to negotiate a callback with the other end. When CBCP is enabled, either the client or the server can request that the server call the client back either at a number supplied by the client or a prearranged number stored on the server. By configuring the server with a prearranged number to call back, you can ensure that the remote access users can call only from a specific location. The remote access server can also be configured to accept or reject calls based on the Caller ID or Automatic Number Identification (ANI) information transmitted by the phone company.

The advantages of using dial-up remote access instead of providing access across the Internet include the following:

Disadvantages of using dial-up lines to provide a remote access solution include the following:

Internet Connections

When accessing your company's network across the Internet, you connect a remote access server to the Internet, typically through a secure interface such as a firewall. Users connect to the Internet through an Internet service provider (ISP), and a virtual private network (VPN) connection is established between the remote user's computer and the remote access server.

The remote access user can connect to the Internet using a number of different connection devices, including a telephone modem, ISDN modem, DSL modem, or cable modem. Regardless of how the remote user connects to the Internet and how your server is connected to the Internet, the communications link is established across the Internet. Some of the advantages of using Internet-based remote access include the following:

Disadvantages of using the Internet to provide access to your internal network include the following:

Exercise: Configuring a Remote Access Connection

In the following exercise, you learn how to configure a remote access connection on a computer running Microsoft Windows 2000. (This exercise should work similarly on Windows ME, Windows 98, and Windows XP, although the steps may vary slightly.)

  1. From the Start menu, click Settings, then Control Panel.

  2. Open Network And Dial-up Connections.

  3. Create a new connection by running the Make New Connection Wizard.

  4. Complete the Create a New Network Connection Wizard to create a dial-up connection using the following information:

    1. Dial-up to private network

    2. Use a modem for the dial-up connection

    3. Any phone number

    4. Allow only yourself to use the connection

    5. Use the default name for your new connection

  5. Start the Create a Connection Wizard by following steps 1-3 and then create another connection using the following information:

    1. Connect to a private network through the Internet

    2. Do not dial the initial connection

    3. IP Address of 192.168.0.1

    4. Allow only yourself to use the connection

    5. Use the default name for your new connection

  6. Compare the two connections that you created and review the information necessary to create each and answer the following questions:

    1. Did you need to provide a telephone number for each type of connection? If not, which did you have to provide the telephone number for?

    2. Did you have to dial an initial connection for both of them?

    3. Did you have to provide an IP address for both connection types?

Lesson Review

The following questions are intended to reinforce key information presented in this lesson. If you are unable to answer a question, review the lesson and then try the question again. Answers to the questions can be found in Appendix A, "Questions and Answers."

  1. What are two types of remote access connectivity solutions?

  2. What security concerns must you consider when providing remote access connectivity solutions?

  3. A technique used to identify modems connected to telephone lines is known as

    1. Callback Control Protocol

    2. War dialing

    3. War driving

    4. War walking

Lesson Summary

As a network administrator, you will most likely be required to provide remote access to your network, and with wireless communications becoming common, you must understand both technologies. In this lesson you learned the following:

Категории