Telnet
■ Operates on port 23
■ Sends text-based commands to remote devices
■ Sends data in plain text, so it is not secure for sensitive information
■ Should never be used for secure devices like routers, switches, or firewalls
Secure Shell (SSH)
■ Operates on port 22
■ Encrypts data sent between client and server
■ Provides better security compared to Telnet
■ Always use SSH for configuring networking devices
Remote Desktop Protocol (RDP)
■ Operates on port 3389
■ Developed by Microsoft for graphical interface remote connections
■ Useful for remotely accessing Windows servers or client machines
■ Provides a Graphical User Interface (GUI) for remote control
■ Uses tunneling to secure connections
Remote Desktop Gateway (RDG)
■ A Windows server that creates secure connections to servers via RDP
■ Uses SSL or TLS protocols to encrypt data
■ Security features
● Creating encrypted tunnels like a VPN
● Controlling access to network resources based on permissions and group roles
● Maintaining and enforcing authorization policies
● Monitoring the status of the gateway and any RDP connections passing through that gateway
■ Recommended for Windows 2008 or newer to protect RDP connections
Virtual Network Computing (VNC)
■ Operates on port 5900
■ Designed for thin client architectures and Virtual Desktop Infrastructure (VDI)
■ Cross-platformed
● Linux
● OS X
● Windows
■ Allows remote access with a graphical interface
Virtual Desktop Infrastructure (VDI)
■ Hosts a desktop environment on a centralized server
■ Runs a desktop image within a virtual machine for end-user access
■ Also known as Desktop as a Service (DAS) in cloud computing
In-Band vs. Out-of-Band Management
■ In-Band Management
● Uses Telnet or SSH over the network
■ Out-of-band Management
● Uses a separate network for device configuration
● Provides additional security by separating data networks from management networks
Application Programming Interface (API)
■ Set of protocols and routines for building and interacting with software applications
■ Acts as an intermediary between different systems for communication
■ Allows for automated administration, management, and monitoring of applications and services
■ Typically built using either Representational State Transfer (REST), or Simple Object Access Protocol (SOAP)
■ Allows for direct integration of different third-party applications