Windows 8

1. Windows 8 2. Module 1 - Installing and Deploying Windows 8. 3. Windows 8 editions. 4. Advantage of 64 bit Processor. 5. Minimum hardware requirement for Windows 8 6. Option for installing Windows 8 7. Installation of Windows 8 8. Upgrading and Migrating to Windows 8 9. What is Upgrading 10. What is Migration 11. Migrating User Data and Settings 12. Migrating using USMT ( User State Migration Tool ) 13. MBR - Master Boot Record 14. GUID - GPT Disk. 15. Disk Management tools. 16. Simple Volume 17. Spanned and Striped Volumes 18. Maintaining Disks, Partitions, and Volumes 19. Disk Quota 20. Device Driver in Windows 8 21. System Restore 22. LAST KNOWN GOOD CONFIGURATION 23. Configure and Trouble shoot Network Connections 24. What is an IPv4 Address 25. Default Gateway 26. Public and Private IPv4 Address 27. IPv6 Network Connectivity 28. IPv4 Address can be assigned by following types 29. Implementing Name Resolution 30. Trouble Shooting Network Connectivity 31. Implementing Wireless Security 32. Wireless network Technologies 33. What is Wireless Broadband? 34. IEEE 802.11 35. Wireless Network Configuration 36. Security Types 37. Implementing Network Security. 38. Configuring Windows Firewall 39. Ports and Application 40. Important Application, Protocol and Port Number 41. Configure Inbound and Outbound Rules 42. Securing Network traffic 43. Configuring Windows Defender 44. Managing File Access 45. NTFS Standard permission for FOLDER 46. Preventing Permission Inheritance 47. Different ways to Share Folder 48. RULE for setting NTFS + SHARE PERMISSION 49. Managing Printers 50. SkyDrive 51. Securing Windows 8 Desktop 52. User Account Types and Rights 53. Windows Authentication Methods 54. Important Security Features in Windows 8 55. Managing EFS Certificates 56. BitLocker 57. Configuring BitLocker To Go 58. UAC - User Account Control 59. Configuring Application. 60. Application Compatibility Issue 61. Resolve Common Application Compatibility Issues 62. Office 365 63. Windows Store 64. LOB (Line Of Business) and Sideloading 65. Configuring Internet Explorer Settings 66. AppLocker 67. Optimizing and Maintaining Windows 8 Client Computers 68. Performance Monitor 69. Commonly used Performance Counters 70. Resource Monitor 71. Managing Reliability of Windows 8 72. Managing Windows 8 Updates 73. Configuring Mobile Computing and Remote Access 74. Tools for Configuring Mobile Computers and Device Setting 75. Configure VPN Access 76. Data encryption 77. VPN Tunneling Protocols 78. Configure Remote Desktop and Remote Assistance 79. Remote Assistance 80. DirectAccess 81. Hyper-V 82. VHD 83. Managing Snapshot 84. Troubleshooting and Recovery Options for Windows 8 85. Enable and configure Windows 7 File Recovery 86. Advance Troubleshoot now option 87. Windows 8 System Restore 88. Using Windows PowerShell
Pr.Pg Next Pg

Configure VPN Access tutorials

 

  • Now itís time for VPN - Virtual Private Network

  • Describe VPNs.

  • Tunneling protocols used in VPNs.

  • VPN reconnect.

  • Configure a VPN.

  • Describe the Connection Manager Administration Kit.

  • Describe the options for creating a connection profile.

  • Create a connection profile.

 

 

  • A VPN (Virtual Private Network) provides Point-to-Point connection between private network, through a public network such as Internet.

  • It enables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality, security and management policy of the private network.

  • This is done by establishing a virtual Point-to-Point connection through the use of dedicated connection, encryption or by using both.

  • VPN connection across the internet is technically a WAN (Wide Area Network) link between the sites, but appears to the user as a private network link and thatís why it is called Virtual Private Network.

  • As Packets travel through the Public network, Data is Encrypted to ensure confidentiality.

  • The link in which the private data is encapsulated and encrypted is known as VPN connection.

  • There are two types of VPN connection.

    1. Remote Access

    2. Site-to-Site

Remote Access VPN

  • Remote access VPN connections enable users working at home, client sites or from public wireless access points to access a server on your organizationís private network.

  • They can connect to Organizationís server by using public network such as Internet.

  • From userís perspective, VPN is a Point-to-Point connection between the computer VPN client and Organizationís server.

  • The exact infrastructure of the shared or public network is irrelevant because it appears logically as if the data is sent over a dedicated private link.

 

Site-to-Site VPN

  • Site-to-site VPN connections is also known as router-to-router VPN connections.

  • It enables Organization to have routed connections between separate offices or premises over a public networks by maintaining secure communications.

  • A routed VPN connection across the Internet logically operates as a dedicated wide area network (WAN) link.

  • When networks connect over the Internet, a router forwards packets to another router across a VPN connection.

  • To the routers, the VPN connection operates as a data-link layer link.

  • A site-to-site VPN connection connects two portions of a private network and both routers authenticate themself.

  • In a site-to site VPN connection, the packets sent from either router across the VPN connection typically do not originate at the routers.

 

VPN Connection Properties

  • VPN connections that uses the PPTP (Point-to-Point Tunneling Protocol), L2TP / IPsec (Layer 2 Tunneling Protocol with Internet Protocol Security) or SSTP (Secure Socket Tunneling Protocol) have following properties.

 

Encapsulation

  • With VPN technology, private data is encapsulated with a header that provides routing information, which allows the data to traverse the transit network.

 

Authentication

  • Authentication for VPN connections takes three different forms.

  • User-level authentication by using PPP (Point-to-Point Protocol) authentication

  • To establish the VPN connection, the VPN server authenticates the VPN client that is attempting the connection by using a PPP user-level authentication method, and verifying that the VPN client has the appropriate authorization.

  • If you use mutual authentication, the VPN client also authenticates the VPN server, which provides protection against computers that are posing as VPN servers.

  • Computer-level authentication by using IKE (Internet Key Exchange)

  • To establish an IPsec security association, the VPN client and the VPN server use the IKE protocol to exchange either computer certificates or a pre-shared key.

  • In either case, the VPN client and server authenticate each other at the computer level.

  • We recommend computer-certificate authentication, because it is a much stronger authentication method.

  • Computer-level authentication is only performed for L2TP/IPsec connections.

  • Data origin authentication and data integrity

  • To verify that the data sent on the VPN connection originated at the connectionís other end and was not modified in transit, the data contains a cryptographic checksum based on an encryption key known only to the sender and the receiver.

  • Data origin authentication and data integrity are only available for L2TP/IPsec connections.


Pr.Pg border                                              Next Pg