Time
1 hour 43 minutes
Difficulty
Intermediate
CEU/CPE
2

Video Transcription

00:01
Hi, everyone, welcome back. Let's begin our topic on remote access technologies.
00:08
Remote access technologies are tools used to access a network device remotely. This means you won't have to always be physically connected to the device in order to access it.
00:19
It uses the client server model, which requires the client to enter user credentials
00:25
to access the remote device server.
00:28
This generally helps to assure that only authorized personnel can only access the remote device and make authorized modifications to the settings and configurations on the system.
00:39
They're too common ways to remote access, which are command line interface CLI
00:45
or remote desktop application. Common CLI based protocols are telnet and ssh
00:53
tools such as Windows Command Prompt can be used for telnet. And third party applications like putty can be used for both Telnet and ssh.
01:03
Remote desktop software provides a graphical mirror view off a systems machine. You can use third party software such as team, viewer or any desk, as you can simply access a remote PC. As long as Internet is available
01:18
for better security, you may want to establish a VPN connection and then used when those remote desktop to access the remote PC
01:30
Telnet uses TCP Port 23 by default tell that server is installed and should be enabled on the remote device and the town that client software should be installed
01:41
and enabled on a laptop or PC.
01:45
It is communicated in clear text format, which poses as a security threat if a packet sniffer is put in place between the client and the server because it is intercepting and logging the traffic.
01:57
This is why it is advised not to use talent over the Internet as cyber criminals are on the lookout for such vulnerabilities on your network.
02:07
This is where or why. As this H or Secure Shell was developed as a secured alternative to tell Net.
02:15
It follows a similar concept of his predecessor whereby an SSH server is installed and enabled on a remote device and the ssh client software will be installed and enabled on a PC or laptop.
02:29
The key differences are that S S H uses TCP port 22 by default and that data communications is now encrypted.
02:38
This is the recommended format to use when using CLI remote access over the Internet.
02:50
Remote desktop applications allow remote access to another computer
02:54
in a more graphical representation as it mirrors the view of the remote PC
03:00
Microsoft Remote desktop connection is a common example of this, which is a built in feature in Windows computers and can be downloadable for Mac computers.
03:09
There are third party applications as well that you can use, such as team, viewer or any desk,
03:15
which only requires the client and remote device toe. Have Internet access and knowing the user credentials of the remote PC
03:23
Once it's installed, these applications are integrated to be either a server or clients.
03:30
User ID's tend to be fixed while the pastors are randomly generated by default each time you close and open the application.
03:38
You can, however, enter in your own custom password. But just remember to follow the usual best practices when creating a password, such as using alpha numeric characters at an acceptable length of at least eight characters and something uncommon but yet easy to remember.
04:00
All right, Chris Time.
04:01
Generally, what are the two important elements you usually need to input when you remote access into a system
04:19
user name or i D and password
04:28
In network operations, it is recommended to use VP and technology when you remote access into your systems over the Internet,
04:35
as we have learned, it will keep your data and communications encrypted when you perform your tasks.
04:43
When using CLI, remote access is also recommended to use as his h
04:47
maybe in a test environment, she can make things easier by using. Tell nets
04:53
the one to make them operational and require accessing them over an unsecure network. Make sure to change from telnet to ssh.
05:00
Add in a little A C l for increased security
05:04
toe only Allow white list of authorized I'd be host or unauthorized i p sub net to execute as S. H. Also, you can use this log to track user access and changes on your systems,
05:20
and we're done with our topic on remote access technologies. So to summarize what we discussed,
05:28
we learned the types of remote access which is tell net as S H and remote desktop.
05:33
We also covered a little bit on the remote access best practices in network operations.
05:41
So let's head over to our next topic. See, there

Up Next

Network Operational Management

This course is designed to help network specialists understand the responsibilities and best practices involved with monitoring and managing network operations.

Instructed By

Instructor Profile Image
Sheane Jayne
Network Engineer
Instructor