Network+ Remote Management Facts 15.3.4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In addition to these solutions, most operating systems or network services provide management tools that are capable of contacting a system remotely. Organizations that allow employees to remotely access network resources should create remote access policies. Because employees use unregulated personal and public devices and networks for remote access, enforcing remote access security standards is essential to protecting your network. Your organization should have a remote access policy document that every employee is familiar with. This document should specify acceptable ways to dial in to a network and access resources. For example, it would be a good idea to prohibit the use of Telnet, since it is insecure. Additionally, you should specify standards that remote access devices must achieve, like having the latest patches and receiving regular virus scans. Lastly, include a statement that requires the employee to agree to follow the remote access policies.

Remote Access Network Resources

Instead of showing a simple command line interface, a remote desktop utility displays the graphical user interface of a remote device. Remote desktop solutions are used to remotely manage a computer or allow support personnel to view and troubleshoot a remote user's system. Remote desktop software typically has the following three components: *The server software, which runs on the target desktop. *The client (or viewer) software, which runs on a remote system (when you run the client software, you see the desktop of the server system). *The remote desktop protocol, which is responsible for communication between the server and the client as follows: 1. The graphical desktop on the server is sent to the client. 2. Keystrokes and mouse movements on the client are sent to the server. 3. The server executes the actions performed on the client, which modifies data on the server and results in changes to the desktop. 4. The desktop changes are transferred and displayed on the client. The remote desktop protocol is optimized to minimize the amount of traffic generated by this exchange. There are multiple protocols that can be used for remote desktop connections. *Virtual Network Computing (VNC) was originally developed for UNIX. Applications using VNC include RealVNC, TightVNC, UltraVNC, and Vine Server. *Independent computing architecture (ICA) is the protocol used by Citrix products (WinFrame and MetaFrame/XenApp). *The remote desktop protocol (RDP) is the protocol developed by Microsoft and used in Microsoft's Remote Desktop Services and Remote Assistance solutions. Aqua Connect has licensed RDP and created a version for Mac OS X as a server. RDP uses TCP and UDP port 3389. Most remote desktop protocols support the following features: *Client software for a variety of operating systems. *Server software for a limited number of operating systems. *The ability to show a remote desktop in a browser without installing client software. *Redirecting printing, sound, or storage from the server to devices connected to the client.

Remote Desktop

A terminal is a monitor and keyboard attached to a device (such as a mainframe, server, or router) through a serial or special console port. The terminal displays a text-based interface, and users interact with the device by typing commands. A terminal emulation utility is a program that allows a console connection through the network. The terminal emulation software communicates with the device over the network and displays the text-based console screen. There are two common terminal emulation programs used. *Telnet opens a plaintext unsecure connection. Telnet uses TCP port 23. *SSH provides the same capabilities as Telnet, but encrypts data. SSH uses TCP port 22. You should never use Telnet for any type of network communication. Telnet sends all data in plaintext, including usernames and passwords, making it extremely easy for someone to intercept and compromise transmitted data.

Terminal Emulation


Kaugnay na mga set ng pag-aaral

Consumer Finance Midterm 1 and 2

View Set

MGMT CH2 THE EVOUTION OF MANAGEMENT THOUGHT

View Set

N5451 Skills Lab > Video Quizzes > Module 8. Hygiene

View Set

((Chapter 8)) Economic Growth, the Financial, and Business Cycles

View Set

Shakespeare's Macbeth - Key Quotes: Duncan

View Set