Preview

LAB 7 IS3220 INFORMATION TECHNOLOGY INFRASTRUCTURE SECURITY

Powerful Essays
Open Document
Open Document
1528 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
LAB 7 IS3220 INFORMATION TECHNOLOGY INFRASTRUCTURE SECURITY
VPN connectivity troubleshooting checklist

1. Users can't access file servers If the user can access the file server using an IP address but not a name, then the most likely reason for failure to connect is a name resolution problem. Name resolution can fail for NetBIOS or DNS host names. If the client operating system is NetBIOS dependent, the VPN clients should be assigned a WINS server address by the VPN server. If the client operating system uses DNS preferentially, VPN clients should be assigned an internal DNS server that can resolve internal network host names.

When using DNS to resolve internal network host names for VPN clients, make sure that these clients are able to correctly resolve unqualified fully qualified domain names used on the corporate network. This problem is seen most often when non-domain computers attempt to use DNS to resolve server names on the internal network behind the VPN server.

2. Users can't access anything on the corporate network
Sometimes users will be able to connect to the remote access VPN server but are unable to connect to any resources on the corporate network. They are unable to resolve host names and unable to even ping resources on the corporate network.

The most common reason for this problem is that users are connected to a network on the same network ID as the corporate network located behind the VPN server. For example, the user is connected to a hotel broadband network and is assigned a private IP address on network ID 10.0.0.0/24. If the corporate network is also on network ID 10.0.0.0/24, they won't able to connect because the VPN client machine sees the destination as being on the local network and will not send the connection to the remote network through the VPN interface.

Another common reason for communications failures is that the VPN clients are not allowed access to resources on the corporate network due to firewall rules on the collocated VPN server/firewall device to which they are connected.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The General approach of the process of troubleshooting TCP/IP connectivity issues with the assumption that you will have access to the client and may not have access to the server. If the problem is determined to be a server issue, you contact the server administrator. If you are the server administrator you can apply the troubleshooting process in reverse server to client to further troubleshoot connectivity issues. To efficiently troubleshoot a TCP/IP connectivity problem it is necessary to identify a single pair of source and destination devices that are exhibiting the connectivity problem. When you've selected the two devices test to make sure that the problem is actually occurring between these two devices. Possible problems include these. Physical layer issue somewhere along the path. First hop Layer 3 connectivity issue local LAN segment. Layer 3 IP connectivity issue somewhere along the packet's path. According to the cisco site, below are some starting points they suggest. Try to ping from the source to destination device by IP address. If the ping fails verify that you are using the correct address and try the ping again. If the ping still fails go to the next section Troubleshooting Local Connectivity Problems proceed to Step. Try to ping from the source to the destination device by name. If the ping fails verify that the name is correctly spelled and that it refers to the destination device and then try the ping again. If the ping still fails go to the section Troubleshooting Domain Name Server Problems. If you can ping the destination by both name and address it appears that the problem is an upper layer problem.…

    • 279 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    This domain is the fastest way for the system to be compromised. I would implement an AUP (acceptable use policy) that will be understood and signed by all employees with access to the network. The employees will also have to go through initial information security training before gaining access to the network. This training will also be required annually in order to maintain their access to the network. The AUP will dictate the requirements for passwords. The requirements will include an eight character alphanumeric password, two uppercase letters, two lowercase letters, two special characters, and two numbers. This will make it more difficult for the password to be breached. The AUP will also state that the company systems will only be used for work related purposes. All social networking sites and many other miscellaneous sites will be blocked. The user will also have to consent to monitoring when signing the…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Sdsa300 Unit 1

    • 178 Words
    • 1 Page

    Most would say VPN is the low-cost way to establish remote connections between offices and to securely provide connections to a mobile workforce. The central office should be equipped with a VPN concentrator that is configured to maintain the number of connections to be serviced for the mobile sales force. In order to provide complete network access to the mobile workforce the use of IPSec with L2TP, ESP, AH, using SHA-256, RSA2048 and AES256 is recommended over a UDP transport. Each branch office and the central office will require a point of presence to the Internet along with a local loop that provides enough bandwidth to accommodate the office demands. In order to keep cost to a minimum, it is recommended that SDSL be used at each branch…

    • 178 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Neither remote-access nor site-to-site…

    • 268 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Scope this policy applies to all Richman Investments employees, contractors, vendors and agents with a Richman Investments-owned or personally-owned computer or workstation used to connect to the Richman Investments network. This policy applies to remote access connections used to do work on behalf of Richman Investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to: frame relay, DSL, ISDN, SSH, VPN, dial-in modems, and cable modems, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT1330 Unit 2 Assign 1

    • 275 Words
    • 1 Page

    If the workstations still do not work after trying the previous suggestions you can always assign your workstations using static IP addressing. It will be time consuming but with only twenty five workstations it shouldn’t be too overwhelming.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    Click the Security tab and then take a screen shot of the VPN Server Connection Properties sheet by pressing Alt+Prt Scr. Then paste the resulting image into the Lab 18 worksheet file in the page provided by pressing Ctrl+V.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    nt1230

    • 905 Words
    • 6 Pages

    What other test could you perform to prove that it was your computer’s firewall that was blocking the connection and not the firewall on the computer you are using as a client?…

    • 905 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Lab 18

    • 425 Words
    • 2 Pages

    Rob calls the help desk to report that he cannot access any websites on the Internet. While he is still on the phone, you have him try to access a file on his departmental server. In both cases, his attempts fail. Troubleshoot Rob’s computer and determine why he is unable to access the network. The troubleshooting process will be completed when you are able to access the network using Rob’s computer.Completion time20 minutes…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Check switches, routers to ensure they are up to date. Check routing protocols, and check for unauthorized network access.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    This policy applies to all Richman investments employees, contractors, vendors and agents with a Richman investments-owned or personally-owned computer or workstation used to connect to the Richman investments network. This policy applies to remote access connections used to do work on behalf of Richman investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    lab 6

    • 252 Words
    • 2 Pages

    4. Through command window determine the cause of the network connection loss using the IP configuration. Next renew the connection lost.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Good Essays

    You can also add the VPN settings to your connection that provides another encryption layer to your network as if anyone remain able to join the network needs hard time to gain access to…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To best addressing this issue let me explain about the network errors first. Network errors…

    • 366 Words
    • 2 Pages
    Good Essays