+ All Categories
Home > Documents > Module 11

Module 11

Date post: 23-Feb-2016
Category:
Upload: meagan
View: 46 times
Download: 0 times
Share this document with a friend
Description:
Module 11. Configuring Mobile Computing and Remote Access. Module Overview. Configuring Mobile Computers and Device SettingsConfiguring VPN AccessConfiguring Remote Desktop and Remote AssistanceOverview of DirectAccess. Lesson 1: Configuring Mobile Computers and Device Settings. - PowerPoint PPT Presentation
Popular Tags:
39
Microsoft ® Official Course Module 11 Configuring Mobile Computing and Remote Access
Transcript
Page 1: Module 11

Microsoft® Official Course

Module 11

Configuring Mobile Computing and Remote Access

Page 2: Module 11

Module Overview

Configuring Mobile Computers and Device SettingsConfiguring VPN AccessConfiguring Remote Desktop and Remote Assistance•Overview of DirectAccess

Page 3: Module 11

Lesson 1: Configuring Mobile Computers and Device SettingsDiscussion: Types of Mobile Computers and DevicesTools for Configuring Mobile Computers and Device SettingsWhat Are Mobile Device Sync Partnerships?Power Plans and Power-Saving Options•Demonstration: Configuring Power Plans

Page 4: Module 11

Discussion: Types of Mobile Computers and Devices

•How do mobile computers differ from desktops?•What are key end-user needs that mobile computers resolve?

Page 5: Module 11

Tools for Configuring Mobile Computers and Device Settings

Tool FeaturesPower Options • Battery meter

• Power plansWindows Mobility Center

• Key system settings collected in one place • Display brightness, power plan, volume,

wireless networking, external display settings, display orientation, and synchronization status

Windows MobileDevice center

• Synchronize various content including music, video, contacts, calendar events, web browser favorites, and other files between Windows Phone devices and Windows 8

Sync Center• Sync data between desktop computers,

network servers, and mobile devices• Show current status of all sync partnerships

Presentation Settings

• Reconfigure your computer for a presentation• One click changes multiple settings

Page 6: Module 11

What Are Mobile Device Sync Partnerships?Mobile device sync partnerships update

information about the mobile device and the host computer

Desktop

Files sent to mobile device

Mobile

device

Files sent to

desktop

Page 7: Module 11

Power Plans and Power-Saving OptionsPower plan Description

Power Saver

This plan saves power on a mobile computer by reducing system performance. Its primary purpose is to maximize battery life.

High performance

This plan provides the highest level of performance on a mobile computer by adapting processor speed to your work or activity, and by maximizing system performance.

BalancedThis plan balances energy consumption and system performance by adapting the computer’s processor speed to your activity.

Method for turning a computer on or off

Data storage statePowe

r need

sSleep or Standby System State Saved to

Memory LowHibernate System State Saved to Disk NoneShut Down All Data Saved to Disk None

Page 8: Module 11

Demonstration: Configuring Power Plans

In this demonstration, you will see how to configure a power plan

Page 9: Module 11

Lab A: Configuring a Power Plan

•Exercise 1: Creating and Configuring a New Power Plan

Logon InformationVirtual Machines 20687B-LON-DC1

20687B-LON-CL1User Name Adatum\AdamPassword Pa$$w0rd

Estimated Time: 15 minutes

Page 10: Module 11

Lab Scenario

Adam is about to take a long trip to visit all of A. Datum’s customers in the United Kingdom. Before he leaves, he would like you to optimize the power consumption on his Windows 8 laptop.

Page 11: Module 11

Lab Review

• In the lab, you configured a power plan to optimize the battery life of Adam’s laptop computer. What are the compromises that arise from this?

Page 12: Module 11

Lesson 2: Configuring VPN Access

What Is a VPN Connection?Tunneling Protocols for VPN ConnectionsVPN AuthenticationWhat Is VPN Reconnect?Demonstration: Configuring a VPNWhat Is the Connection Manager Administration Kit?Configuring and Distributing a Connection Profile•Demonstration: Creating a Connection Profile

Page 13: Module 11

What Is a VPN Connection?Large Branch

Office

Medium Branch Office

Small Branch Office

Home Office with VPN

Client

Remote User with VPN Client

Corporate Headquarters

VPN

VPN Server

VPN Server

VPN Server

VPN Server

A VPN provides a point-to-point connection between components of a private network, through a public network such as the Internet

Page 14: Module 11

Tunneling Protocols for VPN Connections

Windows 8 supports four VPN tunneling protocols:

• PPTP

• L2TP/IPsec

• SSTP

• IKEv2

Page 15: Module 11

VPN Authentication

When selecting authentication, always choose the strongest and most secure form of authentication supported by all the components within your network infrastructureAvailable methods:• PAP• CHAP• MS-CHAPv2• EAP• Digital certificates

Page 16: Module 11

What Is VPN Reconnect?

The VPN Reconnect feature maintains connectivity across network outages

VPN Reconnect:• Provides seamless and consistent VPN connectivity • Uses the IKEv2 technology • Automatically reestablishes VPN connections when

connectivity is available• Maintains the connection if users move between

different networks• Makes the connection status transparent to users

Page 17: Module 11

Demonstration: Configuring a VPN

This demonstration shows how to configure VPN client settings

Page 18: Module 11

What Is the Connection Manager Administration Kit?The Connection Manager Administration Kit:• Allows you to customize users’ remote connection

experience by creating predefined connections on remote servers and networks

• Creates an executable file that can be run on a client computer to establish a network connection that you have designed

• Reduces help desk requests related to the configuration of RAS connections

• Assists in problem resolution because the configuration is known

• Reduces the likelihood of user errors when they configure their own connection objects

Page 19: Module 11

Configuring and Distributing a Connection Profile• The CMAK Connection Profile Wizard assists

in the process of creating custom connection profiles for users

• Use the CMAK Connection Profile Wizard to configure:

• The target operating system• Support for VPN• Support for dial-up, including the custom phone

book• Proxy • Custom Help file• Custom support information

Page 20: Module 11

Demonstration: Creating a Connection ProfileThis demonstration shows how to: • Install the CMAK feature• Create a connection profile• Examine the profile

Page 21: Module 11

Lab B: Implementing a Virtual Private Network Connection•Exercise 1: Creating and Testing a VPN Connection

Logon InformationVirtual Machines 20687B-LON-DC1

20687B-LON-CL1User Name Adatum\Administrator Password Pa$$w0rd

Estimated Time: 30 minutes

Page 22: Module 11

Lab Scenario

Adam’s sales trip starts next week. He is keen to be able to access corporate data files while he is on the road. You decide to create a VPN on his laptop computer to facilitate this requirement.

Page 23: Module 11

Lab Review

•You created and test a VPN connection in the lab. When you are configuring the client-side of a VPN connection, what should factors do you need to consider?

Page 24: Module 11

Lesson 3: Configuring Remote Desktop and Remote AssistanceWhat Are Remote Desktop and Remote Assistance?Configuring Remote Desktop•Demonstration: Configuring Remote Assistance

Page 25: Module 11

What Are Remote Desktop and Remote Assistance?

Remote Desktop Remote Assistance• A Windows 8 feature that enables users to connect to their desktop computer from another device

• Enables administrators to connect to multiple remote servers for administrative purposes

• A Windows 8 feature that enables support staff to connect to a remote desktop computer

• Optionally allows for remote control of that computer

• Enables the seeking or offering of assistance

Page 26: Module 11

Configuring Remote DesktopConfiguring Remote Desktop includes setting it

up on the remote computer and the host computer

Host Computer• Launch the Remote Desktop

Connection• Choose Options to see the

Remote Desktop configuration settings

• On the General Tab, enter the remote computer’s name and your authentication credentials

• Save your Connection Settings

• Select preferences on the remaining tabs

Remote Computer• Open the System Window• Select Remote Settings• In the System Properties

Window confirm Allow Remote Assistance selected

• Under Remote Desktop select or add the users who can connect to this computer

Page 27: Module 11

Demonstration: Configuring Remote AssistanceIn this demonstration, you will see how to: • Request Remote Assistance• Configure Windows Firewall to Enable Remote

Administration• Provide Remote Assistance

Page 28: Module 11

Lab C: Implementing Remote Desktop

•Exercise 1: Configuring a Remote Desktop Connection

Logon InformationVirtual Machines 20687B-LON-DC1

20687B-LON-CL120687B-LON-CL2

User Names Adatum\Administrator and Adatum\Adam

Password Pa$$w0rdEstimated Time: 15 minutes

Page 29: Module 11

Lab Scenario

Adam has a desktop computer in his office in London that he may wish to use while he travels around the UK between his customers.

Page 30: Module 11

Lab Review

In the lab, you enabled the Remote Desktop feature through the firewall by editing the local firewall settings. Is there an alternative way in which you can make this change?In the lab, you configured Remote Desktop. In what circumstances can you envision using Remote Desktop to troubleshoot a user’s computer?• If attempting to connect to a remote computer with Remote Desktop from an Internet-connected computer, what other possible configuration changes might you need to make?

Page 31: Module 11

Lesson 4: Overview of DirectAccess

Discussion: Complexities of Managing VPNsWhat Is DirectAccess?Components of DirectAccessWhat Is the Name Resolution Policy Table?How DirectAccess Works for Internal ClientsHow DirectAccess Works for External Clients•Configuring DirectAccess

Page 32: Module 11

Discussion: Complexities of Managing VPNs

What are the challenges you face when you implement VPNs?

Page 33: Module 11

What Is DirectAccess?

Features of DirectAccess:• Connects automatically to corporate network over the public

network• Uses various protocols, including HTTPS, to establish IPv6

connectivity• Supports selected server access and IPsec authentication• Supports end-to-end authentication and encryption• Supports management of remote client computers• Allows remote users to connect directly to intranet servers

DirectAccess enables seamless remote access to intranet resources without first establishing a VPN connection

Page 34: Module 11

Components of DirectAccessInternet websites

DirectAccess server

AD DS domain controllerDNS server

Internal network resources Network location

server

PKI deployment

IPv6/IPsec

External clients

NRPT/ Consec

Internal clients

Page 35: Module 11

What Is the Name Resolution Policy Table?NRPT is a table that defines DNS servers for different namespaces and corresponding security settings. It is used before the adapter’s DNS settings.

Using NRPT:

• DNS servers can be defined for each DNS namespace rather than for each interface

• DNS queries for specific namespaces can be optionally secured by using IPsec

Page 36: Module 11

How DirectAccess Works for Internal Clients

Internet websites

DirectAccess server

Internal clients

AD DS domain controllerDNS server

CRL dist point

Network location server

Consec

NRPT

Page 37: Module 11

How DirectAccess Works for External Clients

DirectAccess server

AD DS domain controllerDNS server

Consec

NRPT

External clients

DNS server

Internal network resources

DirectAccess server

AD DS domain controllerDNS server

Consec

NRPT

External clients

DNS server

Internal network resources

Infrastructu

re

DirectAccess server

AD DS domain controllerDNS server

Consec

NRPT

External clients

DNS server

Internal network resources

Infrastructu

re

Intranet

DirectAccess server

AD DS domain controllerDNS server

Consec

NRPT

External clients

DNS server

Internal network resources

Internet websites

Infrastructure

Intranet

Page 38: Module 11

Configuring DirectAccess

1. Configure the AD DS domain controller and DNS2. Optionally, configure the PKI environment3. Configure the DirectAccess server4. Configure the DirectAccess clients and verify

DirectAccess functionality

Page 39: Module 11

Module Review and Takeaways

•Review Questions


Recommended