Remote-access Guide

implement a new remote access solution

by Eusebio Streich Published 1 year ago Updated 1 year ago
image

On the Select Server Roles dialog, select Remote Access, and then click Next. Click Next three times. On the Select role services dialog, select DirectAccess

DirectAccess

DirectAccess, also known as Unified Remote Access, is a VPN-like technology that provides intranet connectivity to client computers when they are connected to the Internet. Unlike many traditional VPN connections, which must be initiated and terminated by explicit user action, DirectAccess connections are designed to connect automatically as soon as the computer connects to the Internet.

and VPN (RAS) and then click Add Features.

Full Answer

What are the best remote access solutions for a secure work environment?

Top 3 Remote Access Solutions For A Secure Work Environment 1 Business or Enterprise-Level VPNs. Most organizations use a business VPN to allow employees or users to connect to the company’s network no matter where they are located. 2 Remote Desktop Software. ... 3 Cloudbric Remote Access Solution. ... 4 Conclusion. ...

What is remote access and how does it work?

Depending on your needs, a remote access solution can allow employees or members of your organizations to securely access resources located in your private network or remotely connect to another physical computer. So which remote access solution is right for your business or organization?

How can remote users access Automation Components connected to the local router?

Once connected, remote users can access automation components connected to the local router through the VPN tunnel. Unlike option 1, there is no cloud server between the two devices with either method of connection: VPN router to VPN router, or VPN router to VPN software client.

Do VPNs and RDP require server or client-side installation?

Both VPNs and remote access software like RDP require server-and client-side installation for the solution to work. This opens the gates to potential connection errors and untracked access.

image

Can you work remotely?

Most employees that work remotely will not be IT geniuses. Since they will be out of office – working from other locations – or even work off hours, the support that they might need will be limited. By choosing a remote desktop access solution that does not include a difficult setup, you will be making a lot of things easier for your employees. The more user-friendly the software is, the easier it will be for employees to be more productive.

Should every remote worker have the same permissions?

Not every worker that has remote access should have the same privileges and permissions. The software you choose should allow you to set up customized permissions and controls according to the roles of individual employees. Since employee turnover and the growth of the company are always changing, user administration should be as straightforward as possible.

Option 1: Hosted VPN

Hosted VPNs provide a secure connection with simple setup and network configuration. Typical hosted VPN solutions include a VPN router, a hosted VPN server, a VPN client, and connected automation system components (figure 2).

Hosted VPN design considerations

Those considering this solution must have a high level of trust in the hosted VPN vendor, as it will be responsible for securely storing data and making it available to only those who need it. Monthly costs incurred for high data bandwidth usage must also be considered, particularly as those costs are zero for a traditional VPN solution.

Option 2: Traditional VPN

This option requires a local VPN router to connect through the Internet with a secure VPN tunnel to a second remote VPN router or software client (figure 5). Once connected, remote users can access automation components connected to the local router through the VPN tunnel.

Traditional VPN design considerations

The main design consideration for this option is the capability and willingness of an IT team to support this solution at both the local and remote sites for each installation.

Application example: Traditional VPN

Consider two types of OEM machine builders. The first OEM sells very large and complex printing presses with thousands of automation system I/O points, and its customers require the OEM to support the machine, including uptime and throughput guarantees.

Application example: Hosted VPN

The second OEM sells a machine that does not require video monitoring. Local operator interface is provided by an embedded HMI with limited data logging and storage functionality. The OEM machine builder needs two kinds of remote access. The first is VPN access to remotely troubleshoot, debug, and program the machine’s PLC and HMI.

Many considerations

When designing a remote access solution using VPNs, there are many considerations influencing final implementation: initial and sustaining costs, technical expertise during installation and ongoing operation, site control, security risks, and data storage capabilities.

What is remote access?

Depending on your needs, a remote access solution can allow employees or members of your organizations to securely access resources located in your private network or remotely connect to another physical computer.

What is remote desktop software?

The most popular remote desktop software out there is RDP (Remote Desktop Protocol), Microsoft’s free proprietary protocol that allows one user (i.e host machine) to fully control a remote computer through a network connection.

What happens if you hack a remote desktop?

Unfortunately, there are higher security risks associated with remote desktop software; if the connection is hijacked, a hacker can steal or delete important data or files on the computer, install spyware, and so much more.

Is a compromised account a security threat?

There are higher risks now that hackers exploiting victims during the COVID-19 crisis, and a compromised account through such a plugin can pose a tremendous security threat to your entire company or organization.

Do VPNs need server and client side installation?

Both VPNs and remote access software like RDP require server- and client-side installation for the solution to work. This opens the gates to potential connection errors and untracked access.

Secure connection that protects your employees

Alternatives like Virtual Private Networks can open up unnecessary cybersecurity vulnerabilities that cause issues now and in the future.

Reliable, fast, and affordable

Reduce your employees’ frustration with a connection that’s fast and easy to use. And it’s at a cost that’s easy to fit into your budget.

What is remote access plan?

A remote-access plan is a key part of an organization’s digital transformation. It sounds obvious, but prior to the pandemic, 80 percent of companies did not have a remote access plan in place. It’s been a year of playing catch up, but now that many companies are coming out of crisis mode, they are looking at the future ...

Why create a hybrid environment?

It’s a better user experience and it provides you with the flexibility to future-proof your environment when you want to make changes without disrupting the user experience. Most firms still don't have a secure remote access solution in place.

Is remote access necessary?

Remote access isn’t just necessary for productivity ; it’s a strategic decision as well. With a robust remote access plan in place, you can recruit or bring on talent from anywhere in the world. You’ve heard the stories of workers moving out of commuting distance during the pandemic.

Do remote users need MFA?

While you might decide to allow users on the network to log in with single-layer authentication, remote users should need to pass through MFA almost universally. If you have a preferred MFA provider, be sure to design it into your remote access solution. And if you do not, it’s time to think about getting one.

Is MFA part of remote access?

But resources exposed for remote access absolutely must be locked up securely, and MFA should be part of your remote access plan.

IIoT driving OEM business models

The IIoT has revolutionized the way business owners view their production environment by providing the capability to acquire real-time data from machines and devices in the field so that business owners can efficiently monitor and control production processes.

Challenges using VPN & RDC

Virtual Private Network (VPN) and Remote Desktop Connection (RDC), the latter using Virtual Network Computing (VNC), are two common methods used to remotely access machines and equipment at field sites.

Cloud-based secure remote access

Cloud-based remote access is a new type of remote access solution that enables flexible remote access to field machines. The network topology of a cloud-based remote access solution is composed of three components: remote gateway, cloud server, and client software.

Ease of use

Plug and play remote access without technical configuration. In a cloud-based remote access solution, security parameters, such as the hash functions, encryption/decryption algorithms, etc., are configured automatically.

Flexibility and scalability

Client software isn’t limited to a specific hardware platform. As long as they have an active client account, users can download the client software to any laptop/PC and have remote access from anywhere and at any time.

Conclusion

OEMs and machine builders require a secure, easy-to-use, and scalable remote access solution to enable on-demand remote access to machines deployed in the field. The traditional VPN and RDC solutions are cumbersome and require IT/networking knowledge as well as changes in the security/firewall policies.

New solution allows OEMs to troubleshoot equipment from anywhere and reduce customer downtime

During the global pandemic, OEMs have been using remote connectivity to customers’ equipment to not only reduce workplace exposure to COVID-19, but also reduce travel, service equipment faster and reduce downtime.

The solution packages together everything OEMs need to remotely access and support equipment, including

The FactoryTalk Remote Access cloud-based software, which allows OEMs to manage, configure and initiate secure connections to a customer’s equipment.

Additionally, OEMs can use the solution to reimagine how they support customers, such as with virtual commissioning and remote firmware management

This new solution designed for OEMs is only the latest remote access offering from Rockwell Automation. The company also offers a wide range of remote access services for manufacturers, including 24/7 remote application monitoring and support to help customers proactively address maintenance issues.

image

Business Or Enterprise-Level VPNs

Image
Most organizations use a business VPN to allow employees or users to connect to the company’s network no matter where they are located. VPNs are perfect for users who need to access certain resources, databases, intranet (an important distinction from the internet) sites that are only available on the company network…
See more on cloudbric.com

Remote Desktop Software

  • The most popular remote desktop software out there is RDP (Remote Desktop Protocol), Microsoft’s free proprietary protocol that allows one user (i.e host machine) to fully control a remote computer through a network connection. Though RDP is Microsoft’s in-house developed technology, there are many other remote desktop programs and software available that work ex…
See more on cloudbric.com

Cloudbric Remote Access Solution

  • If none of these solutions fit your business or organizational needs, there are other remote access solutions that may meet your requirements. These tools may include cloud computing solutionswhether it be for storage, filing, or collaborative purposes. Another alternative is Cloudbric’s Remote Access Solution which works vastly different from trad...
See more on cloudbric.com

Conclusion

  • Preparing a secure remote work environment is not always an easy task. It requires businesses and organizations to be flexible in adopting new technologies for the remote workforce. This also means companies must know exactly what they aim to gain from implementing a new solution. Is it better security? Uncomplicated remote access? Easy setup? If you’re unsure which remote acc…
See more on cloudbric.com

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9