Remote-access Guide

remote access design

by Mr. Andy Lakin DVM Published 2 years ago Updated 1 year ago
image

One of the goals of remote-access network design is to provide a unified solution that allows for seamless connectivity to remote users. This article is about the providing remote access to users which are not in office, with this remote access these users may able to access their office’s network from home or from other offside location.

Full Answer

What is the remote access use case for the Internet Edge?

The Remote Access Virtual Private Network (RA VPN) zone implements dedicated resources to connect remote users and sites. This design guide focuses on the remote access use case within the Internet edge PIN, which is one of the six use case flows outlined in the SAFE Edge Architecture Guide.

How does remote access work with DirectAccess?

With one network adapter: The Remote Access server is installed behind a NAT device, and the single network adapter is connected to the internal network. Identify your IP addressing requirements: DirectAccess uses IPv6 with IPsec to create a secure connection between DirectAccess client computers and the internal corporate network.

What is remote PC access and how does it work?

Remote PC Access is an easy and effective way to allow users to access their office-based, physical Windows PC. Using any endpoint device, users can remain productive regardless of their location. However, organizations want to consider the following when implementing Remote PC Access.

How do I set up remote access?

Identify the network adapter topology that you want to use. Remote Access can be set up with any of the following topologies: With two network adapters: The Remote Access server is installed at the edge with one network adapter connected to the Internet and the other to the internal network.

image

What are the remote access methods?

The primary remote access protocols in use today are the Serial Line Internet Protocol (SLIP), Point-to-Point Protocol (PPP), Point-to-Point Protocol over Ethernet (PPPoE), Point-to-Point Tunneling Protocol (PPTP), Remote Access Services (RAS), and Remote Desktop Protocol (RDP).

What are the components of remote access?

The network topology of a cloud-based remote access solution has three components: a remote gateway, a cloud server, and client software. Remote gateways are connected to field equipment in order to remotely access and control them.

What is the most common form of remote access?

remote access virtual private network (VPN)One common method of providing remote access is via a remote access virtual private network (VPN) connection. A VPN creates a safe and encrypted connection over a less secure network, such as the internet.

What is a remote access standard?

PURPOSE. Remote Access refers to the ability to access UMW network resources while off campus. Security measures for remote access should be implemented based on sensitivity and risk to University systems and data.

What are three examples of remote access locations?

What Is Remote Access?Queens College.Harvard University Extension School.

How do I create a secure remote access?

7 Best Practices For Securing Remote Access for EmployeesDevelop a Cybersecurity Policy For Remote Workers. ... Choose a Remote Access Software. ... Use Encryption. ... Implement a Password Management Software. ... Apply Two-factor Authentication. ... Employ the Principle of Least Privilege. ... Create Employee Cybersecurity Training.

What are the two types of remote access servers?

Remote Access Methods1- Remote Access Server: It's one server in organization network that it is the destination of all remote access connections.2- Remote Access Client: All computers that remote connect to network, called remote access client or remote computer.More items...•

What are remote access applications?

Remote desktop software, more accurately called remote access applications or remote access software, let you remotely control any computer in another location. With the help of these remote access applications, you can take over the mouse and keyboard of another computer and use it just like your own.

What are remote servers?

Remote servers provide access to shared data and objects in your organization. A user's level of access depends on the security group that the administrator assigns to the user name (client ID) that the user employs to access the remote server.

What is an access policy?

n. Principles or procedures that control the conditions under which individuals have permission and ability to consult a repository's holdings.

What is remote connectivity?

Remote access is the act of connecting to IT services, applications, or data from a location other than headquarters. This connection allows users to access a network or computer remotely via the internet.

What are the five elements of a remote access security readiness review?

The review examined cybersecurity at the governance layer and identified five critical pillars key to cybersecurity readiness: culture, people, structure, processes, and resources.

How does Microsoft Quick Assist work?

Quick Assist opens on the sharer's device. The user enters the provided code in the Code from assistant box, and then selects Share screen. The helper receives a dialog offering the opportunity to take full control of the device or just view its screen. After they choose an option, the helper selects Continue.

How do I connect to my work network outside the office?

How does it work?Download your firewall's VPN client software - usually available for free from the vendors website (SonicWall, Checkpoint, WatchGuard, Meraki, etc).Install the software.Enter your organisation's public IP address.Enter your username and password and connect.

What is remote access plan?

A remote-access plan is a key part of an organization’s digital transformation. It sounds obvious, but prior to the pandemic, 80 percent of companies did not have a remote access plan in place. It’s been a year of playing catch up, but now that many companies are coming out of crisis mode, they are looking at the future ...

Do remote users need MFA?

While you might decide to allow users on the network to log in with single-layer authentication, remote users should need to pass through MFA almost universally. If you have a preferred MFA provider, be sure to design it into your remote access solution. And if you do not, it’s time to think about getting one.

Is remote access necessary?

Remote access isn’t just necessary for productivity ; it’s a strategic decision as well. With a robust remote access plan in place, you can recruit or bring on talent from anywhere in the world. You’ve heard the stories of workers moving out of commuting distance during the pandemic.

Is MFA part of remote access?

But resources exposed for remote access absolutely must be locked up securely, and MFA should be part of your remote access plan.

What is remote access?

Remote PC Access is an easy and effective way to allow users to access their office-based, physical Windows PC. Using any endpoint device, users can remain productive regardless of their location. However, organizations want to consider the following when implementing Remote PC Access.

How to open ports in VDA?

To open the ports that the VDA uses to communicate with the Controller and enabled features, specify the /enable_hdx_ports option, in addition to the /enable_hdx_udp_ports option.

What is VDA in Citrix?

The Virtual Delivery Agent (VDA) on each Office PC must register with Citrix Virtual Apps and Desktops. For on-premises deployments VDA registration happens directly with a Delivery Controller, for Citrix Virtual Apps & Desktops Service in Citrix Cloud this registration happens via a Citrix Cloud Connector.

When a user establishes an HDX session to their office PC, the ICA traffic needs to be?

When a user establishes an HDX session to their office PC, the ICA traffic needs to be proxied to the VDA. ICA Proxy can be provided via Citrix Gateway appliances or Citrix Gateway Service.

Where are computing resources shared?

In certain situations, users need to share a set of computing resources, often found in computing labs at schools, colleges, and universities. Users are randomly assigned to an available physical PC.

Can multiple users be assigned to a desktop?

By default, multiple users can be assigned to a desktop if they have all logged into the same physical PC, but this can be disabled via a registry edit on the Delivery Controllers.

What is remote access server?

The Remote Access server acts as an IP-HTTPS listener and uses its server certificate to authenticate to IP-HTTPS clients. The IP-HTTPS name must be resolvable by DirectAccess clients that use public DNS servers.

What is direct access client?

DirectAccess clients attempt to reach the network location server to determine if they are on the internal network. Clients on the internal network must be able to resolve the name of the network location server, and they must be prevented from resolving the name when they are located on the Internet. To ensure that this occurs, by default, the FQDN of the network location server is added as an exemption rule to the NRPT. In addition, when you configure Remote Access, the following rules are created automatically:

What is DNS in DirectAccess?

DNS is used to resolve requests from DirectAccess client computers that are not located on the internal network. DirectAccess clients attempt to connect to the DirectAccess network location server to determine whether they are located on the Internet or on the corporate network.

Do you have to have a public IP address for DirectAccess?

Ensure that you do not have public IP addresses on the internal interface of the DirectAccess server. If you have public IP address on the internal interface, connectivity through ISATAP may fail.

Can DirectAccess use Teredo?

If the DirectAccess client cannot connect to the DirectAccess server with 6to4 or Teredo, it will use IP-HTTPS. To use Teredo, you must configure two consecutive IP addresses on the external facing network adapter. You cannot use Teredo if the Remote Access server has only one network adapter.

image

Overview

Image
Remote PC Access is an easy and effective way to allow users to access their office-based, physical Windows PC. Using any endpoint device, users can remain productive regardless of their location. However, organizations want to consider the following when implementing Remote PC Access.
See more on docs.citrix.com

Authentication

  • Users continue to authenticate to their office-based PC with their Active Directory credentials. However, as they are accessing over the Internet from outside the office premises, organizations typically require stronger levels of authentication than just user name and password. Citrix Workspace supports different authentication options to be selected including Active Directory + …
See more on docs.citrix.com

Session Security

  • Users can remotely access their work PC with an untrusted, personal device. Organizations can use integrated Citrix Virtual Apps and Desktops policies to protect against: 1. Endpoint Risks: Key loggers secretly installed on the endpoint device can easily capture a user name and password. Anti-keylogging capabilitiesprotect the organization from sto...
See more on docs.citrix.com

Infrastructure Sizing

  • Note:The following sizing recommendations are a good starting point, but each environment is unique, resulting in unique results. Monitor the infrastructure and size appropriately. As users are accessing existing office PCs there is minimal extra infrastructure needed to support adding Remote PC Access, however it is important that the Control layer and Access layer infrastructur…
See more on docs.citrix.com

Availability

  • If the office PC is not powered on with the VDA registered, the user’s session cannot be brokered. Citrix recommends putting in place processes to ensure the machines that users need to connect to are powered-on. If available, modify the PC’s BIOS setting to automatically power on in the event of a power failure. Administrators can also configure an Active Directory Group Policy obje…
See more on docs.citrix.com

User Assignments

  • It is important that users are each brokered to their own office PC. Once the VDA has been installed and the catalog and delivery group defined, users are automatically assigned when they next logon locally to the PC. This is an effective method for assigning thousands of users. By default, multiple users can be assigned to a desktop if they have all logged into the same physic…
See more on docs.citrix.com

Microsoft Teams

  • If users access Microsoft Teams for voice and video calls, content redirection functionality is required to create a positive user experience. For content redirection to be available when using VDA 1912 or older, it is required to deploy the VDA on the physical PCs using the single-session full VDA installer (standalone VDAWorkstationSetup.exe) with the /remotepccommand line optio…
See more on docs.citrix.com

Common Network Ports

  • Similar to any other Citrix VDA, there are a handful of key network ports to be mindful of opening for the system to function. As a reminder, ICA traffic needs to reach the Remote PC Access from the Citrix ADC hosting the external Citrix Gateway. A comprehensive list of ports can be found in Communication Ports Used by Citrix Technologies.
See more on docs.citrix.com

VDA Registration

  • Depending on the network topology, the subnet containing the Virtual Apps and Desktops Delivery Controllers might not allow communication to or from the physical PCs. To properly register with the Delivery Controller, the VDA on the PC must be able to communicate with the Delivery Controller in both directions using the following protocols: 1. VDA to Controller: Kerberos 2. Cont…
See more on docs.citrix.com

Further Guidance

  • More design guidance including considerations and troubleshooting steps can be found in the Remote PC Access product documentation.
See more on docs.citrix.com

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9