Ask a question from expert

Ask now

Enabling Remote Access - PDF

4 Pages710 Words294 Views
   

Added on  2021-06-15

Enabling Remote Access - PDF

   Added on 2021-06-15

BookmarkShareRelated Documents
Running head: ENABLING REMOTE ACCESSEnabling Remote AccessName of the StudentName of the UniversityAuthor’s Note:
Enabling Remote Access - PDF_1
1ENABLING REMOTE ACCESS1. The system administrators currently create the Ken 7 users in every computer wherethe users require access. There are few steps that would help the users in connecting to thenetwork eventually. They could complete this step with the help of a specific dial up connectionor any VPN or virtual private network connection (Jaha & Libya, 2015). Any dial up connectionneeds both the client computer and the server computer for properly configuring the modem.This client or the server makes a connection on the analog public telephone networks. Theremote users can easily identify themselves by means of remote access authentication. Thiswould also make the connection safe and secured. 2. The procedure for making any change to the account details or the passwords of theusers is much different from the remote users. For the remote users, this procedure or processcomprises of three important steps. These steps are as follows:i) The first step is the setting up of RADIUS authentication. The server profile eventuallyidentifies all the external service for authentication and provides necessary instructions. ii) The second step is the creation of an authentication profile. It would be responsible foridentifying the specific server profile (Maiti, Kist & Maxwell, 2015). The password changemessage is added in this step. iii) The final step is the committing of the configuration.3. The specific administrators should connect to the SQL server for allowing a single useraccount to be utilized for the local and remote access. This would eventually restrict the overallaccess of the existing local users and the network would be secured. Moreover, the connection tothe SQL server would also be responsible for securing the database and hence this databasecould be utilized by the users.
Enabling Remote Access - PDF_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Comparison of Remote Access Strategy and Direct Access Strategy
|12
|2896
|375

GNS3 Simulation - Networking
|9
|565
|52

Smart Office Assessment 2022
|13
|1454
|17

Technology Implementation of Security Controls
|4
|787
|192

Network Topology
|11
|544
|155

Corporate Structure - Design Report
|8
|1319
|348