preview

Remote Access And Using Extensible Authentication Protocol Essay

Decent Essays

Remote Access Business today never sleeps in large part to advances in technology. Because of this, users often need access to sensitive company data outside the office which presents many security challenges. Not only is the end user accessing your network resources and potentially sensitive data, but they are many times doing so from a public network which the admin has no control over and is open to others who may have malicious intent. These connections clearly need to be properly secured in order provide end users secure network connections. To secure remote connections, a virtual private network (VPN) will created using the Routing and Remote Access feature available within Windows Server 2012 R2. This feature allows end users to create a secure connection to the network by using Extensible Authentication Protocol-Transport Level Security (EAP-TLS) in addition to smartcards for authentication purposes. Traffic will also be encrypted by using Layer Two Tunneling Protocol over IPSEC (TechNet, 2016). To implement this configuration properly, the certificate authority mentioned above will be used to provide certificates to the servers and clients to authenticate and encrypt transmissions over public networks. The network firewall will be configured to accept this traffic and direct it to the VPN server. This configuration will allow secured remote connections to network resources for employees and end users.
Malware Protection To properly protect network resources

Get Access