Remote Access Methods 3.4
Console Router
A device used to provide remote access to the command-line interface of multiple switch and/or router appliances.
Telnet
A fast and efficient, but insecure way of remoting into a client.
out-of-band management
A switch management option that provides on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, in order to interface with a switch. Can also use a dial up modem to connect.
In-band management
A switch management option, such as Telnet, that uses the existing network and its protocols to interface with a switch.
HTTPS/management URL
A web based configuration interface for various types of devices.
Client-to-site VPN
Also known as a remote-access VPN, a client-to-site VPN interconnects a remote user with a site, as an alternative to dial-up or ISDN connectivity, at a reduced cost.
IPSec
Internet Protocol Security. Used to encrypt traffic on the wire and can operate in both tunnel mode and transport mode. It uses tunnel mode for VPN traffic. IPsec is built into IPv6, but can also work with IPv4 and it includes both AH and ESP. AH provides authentication and integrity, and ESP provides confidentiality, integrity, and authentication. IPsec uses port 500 for IKE with VPN connections. Layer 3 Network Protocol
RDP
Microsoft's implementation of the Remote Desktop Protocol (RDP) dates back to some of the OS's earlier releases that provided a Terminal interface that required extensive knowledge of commands. Features were added to create more effective control with each release. It is now possible to view and control the host you are connected to. VNC (Virtual Network Computing) is the open-source version of this technology allowing vendors and manufacturers to modify the app as needed.
SSH
Secure Sockets Handling (SSH) can be used to initiate console screens on routers, switches and other network devices for analysis or configuration. Consider the SSH key as a substitute for your username and password for authentication. The SSH protocol provides a secure cryptographic connection at both ends.
SSL/TLS/DTLS
These standards permit the use of standard web browsers for secure VPN communications. Secure Socket Layer, Transport Layer Security, and Datagram Transport Layer Security
Site-to-site VPN connection
Connects two private networks. Site-to-site VPN connections can be used to connect branch offices to an organization's primary site or to connect one organization to the network of another organization. This VPN connection allows routed connections to the remote site or network while helping to maintain secure communications over the Internet. When networks are connected over the Internet, a VPN-enabled router forwards packets to another VPN-enabled router across a VPN connection.
FTP/FTPS
FTP allows file transfers but is not secure. FTPS is a secure version of FTP.
VNC
In computing, Virtual Network Computing (VNC) is a graphical desktop-sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer. It transmits the keyboard and mouse input from one computer to another, relaying the graphical-screen updates, over a network.
TFTP
Trivial File Transfer Protocol. Least secure of all the FTP options. Fast transfers on local networks but not suited to Internet travel.
SFTP
Uses SSH to secure FTP transmissions.
VPN
Virtual Private Networks provide a secure, private, encrypted, host-to-host connection called a tunnel. The tunnel is established between a host and a network server in a client to site configuration or as a site to client tunnel.
