Name DC (Domain Controller) RD01 (Remote desktopName DC (Domain Controller) RD01 (Remote desktop

Name
– Amandeep Singh

Date
– 24/1/2018

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Assessment
C6M4 – W2

Remote
desktop service implementation

Task
– Determining the advantages and disadvantages of the implemented
remote desktop server and any issue with the network.

Introduction

Remote desktop connection means providing access to the computer
remotely to different servers which are connected to local network.
It also grants control over keyboard and mouse. According to the
implementation of remote desktop services (RDS), it consists of roles
called as RD Web access, RD Connection Broker, and RD Session Host.
web access enables users to connect to the resources by using a web
browser. Connection broker reconnects or connects client devices to
session-based desktop and session host enables a server to host
remote program.

Machines
required for plan are:-

DC
(Domain Controller)

RD01
(Remote desktop server 1)

RD02
(Remote desktop server 2)

CLIENT
(Windows 10 client)

Router

Server
roles placement-

Machine

Roles

OPERATING
SYSTEM

Dc

ADDS

DNS

Windows
Server 2012 R2

RD01

Remote
desktop session based installation

RD
Connection Broker

Rd
session host

Windows
Server 2012 R2

RD02

Remote
desktop session based installation

Rd
web host

Rd
session host

Windows
Server 2012 R2

CLIENT

Setup
VPN

Windows
10

Router

Pfsence

Pfsence

Point
to point tunneling protocol (PPTP) VPN Connection –
PPTP
is the most common protocol used VPN remote access on the internet.
In this protocol, VPN tunnels are created by two ways. One of them is
PPTP client is launched by the user to make the connection with
internet service provider and second is this protocol creates a TCP
connection between the VPN server and client’s VPN. It uses TCP port
1723 and GRE to establish the connection between tunnel. When the VPN
connection starts working, PPTP controls messages passes between VPN
client and server.

Setting
PPTP VPN connection –
setting VPN means creating a new VPN connection. In the network and
sharing center select setup a new connection option and then select
setup up a new network connection then select VPN. In the VPN
settings select security tab and change VPN type to PPTP and log in
with the credentials to connect. However, while choosing another
protocol select SSTP type of VPN.

Other
VPN Recommendations
– Virtual
private network (VPN) is used to create a safer, encrypted and more
secure connection. VPN technology is increasing. It can access the
system through an external network. For the better working of VPN
connection, the more secure way will be to create a remote desktop
gateway that will provide access to the connection by using Secure
Socket Layer (SSL) protocol. SSL is a transparent protocol that uses
interaction from the end user while developing a secure connection.
SSL VPN uses secure communication between web browser and web server
which turns HTTP address of a website to HTTPS and S stands for
secure. The remote user will only able to access those applications
which are relevant to work, and will not able to access other areas
of the network. In the given diagram is shows how SSL protocol
works.

Advantages
of Remote desktop services –

In
businesses, it can save the ongoing power usage of desktop computers
which will help in the reduction of electricity bills.

Remote
services increase flexibility in business by having access to users
to finish their work.

This
technology does not longer to invest a big amount of money. An
organization can build a general remote setup n a single machine
which can be remotely accessed by authorized devices.

It
is easy to install updates in organizations Pc’s, for example, a new
version of Microsoft Office is available and you have 20 PCs. You do
not have to go around to each computer and start the upgrade. You
can simply use remote desktop services to save time.

Disadvantages

It
depends upon the power of the host machine and how many users are
trying to access the remote desktop connection at the same time. It
will bottleneck according to the usage and reduces the performance.

It
requires reliable network which will work efficiently. The whole
system will go down if the network gets disrupted.

It
locks the remote screen which makes the user unable to see what’s
going on the machine. This is one of the biggest problems of the
Remote Desktop program that hasn’t been resolved yet.

The
remote desktop app comes only in business, professional and ultimate
version of windows. In case if you need to provide support to friend
or family member with windows running home-based
version then remote desktop shouldn’t provide support.

Best
practice and business needs:-

For
business, remote desktop is reliable and save time. Best practice for
remote desktop services is to make a connection with enabling 1:1
network load balancing so that if one server of remote desktop goes
down clients can still have to access and the server will not go
down. Remote desktop does not require an installation it is already
installed on the operating system so there is no need to buy any
product key for it. If any of staff member facing the issue on the
computer an administrator can easily fix it remotely. For the better
security in organization use SSL tunneling protocol VPN. For example,
if an organization has exchange server it will allow exchange users
to access exchange, not any another web application

Conclusion:

VPN
makes the network more secure in business by installing various
security levels as the remote desktop application is very reliable
and cheap, it can easily help staff members to fix issues and manage
daily business tasks and saves time and it is quite secure.

Reference:-

http://au.pcmag.com/software/138/guide/the-best-vpn-services-of-
HYPERLINK
“http://au.pcmag.com/software/138/guide/the-best-vpn-services-of-2017″2017

https://technet.microsoft.com/en-us/library/cc995071.aspx

https://www.lifewire.com/pptp-point-to-point-tunneling-protocol-818182

http://resources.infosecinstitute.com/best-practices-for-securing-remote-access/#gref