1 chapter 12: vpn connectivity in remote access designs designs that include vpn remote access...

23
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection in VPN Remote Access Designs VPN Remote Access Design Optimization

Upload: emily-wilson

Post on 29-Jan-2016

219 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

1

Chapter 12: VPN Connectivity in Remote Access Designs

Designs That Include VPN Remote Access

Essential VPN Remote Access Design Concepts

Data Protection in VPN Remote Access Designs

VPN Remote Access Design Optimization

Page 2: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

2

VPN Remote Access Solutions

Page 3: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

3

Routing and Remote Access and VPN

Virtual private network (VPN) gives control over

Authorized user accounts Security methods Resources to be accessed

Uses Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP)

VPN and Remote Authentication Dial-In User Service (RADIUS) solutions differ in many ways.

Page 4: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

4

Routing and Remote Access and Windows 2000

Routing and Remote Access in Microsoft Windows 2000 includes Remote access client Remote access server

Page 5: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

5

VPN Clients and Servers

Page 6: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

6

VPN Remote Access Design Review

Amount of data transmitted Number of locations Existing Internet connections Plans for network growth Number of simultaneous clients Operating systems used by clients Protocols used by clients

Page 7: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

7

VPN Remote Access Design Decisions

Integration into existing network Hardware requirements for servers Protection for confidential data Availability to remote access users Optimization of network traffic

Page 8: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

8

VPN Remote Access Designs

A third party provides connectivity. Cost reduction is an advantage. Some dial-up security is not available.

Caller ID detection Remote user callback Authentication protocol for dial-up

connection Password security features

Page 9: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

9

VPN Remote Access Scenario

Page 10: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

10

Number of VPN Remote Access Servers

Determine the maximum number of users.

Determine the sustained data rate. Perform a pilot test. Calculate the number of servers.

Page 11: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

11

Placing VPN Remote Access Servers

Placement goals: Centralize administration Reduce costs Reduce network traffic

Single location Multiple locations Adjacent to resources

Page 12: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

12

Single Location Configuration

Provide enough PPTP or L2TP virtual ports.

Advantages Centralized administration Lower administration costs

Disadvantages Increased network traffic on segments No redundancy

Page 13: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

13

Multiple Location Configuration

Provide enough PPTP or L2TP virtual ports.

Advantages Reduced network traffic between locations Redundancy

Disadvantages Decentralized administration and support Increased administration costs

Page 14: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

14

Placing VPN Servers Near Resources

Reduces the segments traversed Improves performance for remote

access clients

Page 15: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

15

Remote Access Client Support

Virtual ports PPTP L2TP

Transport protocols determined by client needs

Network address assignment methods Allocate manually Allocate automatically using Dynamic Host

Configuration Protocol (DHCP)

Page 16: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

16

Preventing Unauthorized Access

Restrict remote access to resources on the server.

Use filters to restrict traffic on servers. Place VPN servers for security

Outside the private network On screened subnets Within the private network

Page 17: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

17

Placing VPN Servers Outside the Private Network

Page 18: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

18

Placing VPN Servers on Screened Subnets

Page 19: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

19

Placing VPN Servers Inside the Private Network

Page 20: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

20

Protecting Remote Access Data

Authenticate remote users. Local accounts Active Directory directory service accounts

Encrypt confidential data. Microsoft Point-to-Point Encryption (MPPE) Internet Protocol Security (IPSec)

Enforce remote access policies.

Page 21: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

21

Enhancing Remote Access Availability

Use redundant VPN remote access servers. Network Load Balancing Round robin DNS

Use multiple Internet connections. Dedicate a computer to running Routing

and Remote Access.

Page 22: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

22

Improving Remote Access Performance

Upgrade hardware. Distribute clients across multiple

servers. Use Network Load Balancing. Use round robin DNS.

Dedicate a computer to running Routing and Remote Access.

Page 23: 1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection

23

Chapter Summary There are many advantages in using

VPN for remote access. Consider the number of users and the

data rate. Use multiple remote access servers. Evaluate the needs of remote clients. Protect private network resources. Improve the availability and

performance of the design.