1 00:00:00,090 --> 00:00:01,080 In this lesson, 2 00:00:01,080 --> 00:00:04,470 we're going to discuss remote access ports and protocols. 3 00:00:04,470 --> 00:00:05,970 As we begin to dive into the world 4 00:00:05,970 --> 00:00:07,920 of remote access ports and protocols, 5 00:00:07,920 --> 00:00:10,410 it's important to remember what their key function is. 6 00:00:10,410 --> 00:00:12,840 And when it comes to remote access ports and protocols, 7 00:00:12,840 --> 00:00:15,120 their key function is for us to be able to manage systems 8 00:00:15,120 --> 00:00:18,660 and network from across the network, or across the world. 9 00:00:18,660 --> 00:00:19,890 Remote access technologies 10 00:00:19,890 --> 00:00:22,200 are crucial in today's interconnected environments, 11 00:00:22,200 --> 00:00:24,390 and allows our network administrators and our users 12 00:00:24,390 --> 00:00:26,340 to control their systems, run commands, 13 00:00:26,340 --> 00:00:28,590 and manage files from a remote location, 14 00:00:28,590 --> 00:00:30,510 no matter where they're in the world. 15 00:00:30,510 --> 00:00:32,340 Now, when we discuss remote access, 16 00:00:32,340 --> 00:00:34,470 there are several protocols that we need to cover, 17 00:00:34,470 --> 00:00:38,100 including SSH, Telnet, and RDP. 18 00:00:38,100 --> 00:00:39,390 Each of these protocols 19 00:00:39,390 --> 00:00:41,400 are ones that we use for remote connectivity, 20 00:00:41,400 --> 00:00:42,270 and each one provides 21 00:00:42,270 --> 00:00:44,970 different levels of functionality and security. 22 00:00:44,970 --> 00:00:46,980 Let's get started with SSH. 23 00:00:46,980 --> 00:00:50,070 Now, SSH or the Secure Shell is a protocol 24 00:00:50,070 --> 00:00:51,870 that's used for secure remote login 25 00:00:51,870 --> 00:00:56,070 and other secure network services over an unsecure network. 26 00:00:56,070 --> 00:00:58,830 SSH is going to operate over port 22, 27 00:00:58,830 --> 00:01:01,710 and it provides a secure channel over an insecure network 28 00:01:01,710 --> 00:01:03,570 in a client server architecture 29 00:01:03,570 --> 00:01:05,250 that offers strong authentication, 30 00:01:05,250 --> 00:01:06,990 and encrypted data communications 31 00:01:06,990 --> 00:01:10,020 for anything inside of that SSH tunnel. 32 00:01:10,020 --> 00:01:12,360 SSH is widely used by network administrators 33 00:01:12,360 --> 00:01:14,880 to control web and server applications remotely, 34 00:01:14,880 --> 00:01:16,170 and to ensure that the communication 35 00:01:16,170 --> 00:01:19,410 is not being intercepted by a malicious actor. 36 00:01:19,410 --> 00:01:21,960 When it comes to SSH, I want you to remember 37 00:01:21,960 --> 00:01:24,780 that it's all about creating a secure encrypted tunnel 38 00:01:24,780 --> 00:01:26,730 so you can operate text-based commands 39 00:01:26,730 --> 00:01:29,790 from wherever you are in the world on a remote server. 40 00:01:29,790 --> 00:01:32,040 This allows you to do this over an unsecured network 41 00:01:32,040 --> 00:01:34,560 like the internet without anybody being able to see 42 00:01:34,560 --> 00:01:36,480 what data you're sending or receiving 43 00:01:36,480 --> 00:01:38,730 over that SSH connection. 44 00:01:38,730 --> 00:01:41,250 The second one we have is known as Telnet. 45 00:01:41,250 --> 00:01:42,960 Now, Telnet is actually one of the earliest 46 00:01:42,960 --> 00:01:46,530 remote login protocols, and it operates over port 23. 47 00:01:46,530 --> 00:01:49,140 Telnet allows a user on one computer 48 00:01:49,140 --> 00:01:51,240 to log in remotely into another computer 49 00:01:51,240 --> 00:01:53,130 that's part of the same network. 50 00:01:53,130 --> 00:01:56,070 Telnet was designed for local area networks only, 51 00:01:56,070 --> 00:01:58,680 although some people have used it over the internet. 52 00:01:58,680 --> 00:01:59,850 The problem with that is that 53 00:01:59,850 --> 00:02:02,700 Telnet actually transfers its data in plain text, 54 00:02:02,700 --> 00:02:03,810 and it makes it susceptible 55 00:02:03,810 --> 00:02:06,600 to eavesdropping and on-path attacks. 56 00:02:06,600 --> 00:02:08,550 This is because there's a lack of encryption, 57 00:02:08,550 --> 00:02:10,470 and this is why SSH was developed 58 00:02:10,470 --> 00:02:13,860 because SSH was developed as a replacement for Telnet, 59 00:02:13,860 --> 00:02:15,510 it can do a lot of the same things, 60 00:02:15,510 --> 00:02:17,700 but it does it inside of an encrypted tunnel, 61 00:02:17,700 --> 00:02:19,500 which gives you more security. 62 00:02:19,500 --> 00:02:21,840 These days, you should never use Telnet. 63 00:02:21,840 --> 00:02:23,670 There's really no good reason to use it, 64 00:02:23,670 --> 00:02:24,503 unless you're operating 65 00:02:24,503 --> 00:02:26,700 some really old legacy piece of equipment 66 00:02:26,700 --> 00:02:29,250 that's been around for the last 20 or 30 years, 67 00:02:29,250 --> 00:02:31,590 and it simply doesn't support SSH. 68 00:02:31,590 --> 00:02:33,450 Anytime SSH is an option, 69 00:02:33,450 --> 00:02:36,090 you should use SSH instead of Telnet. 70 00:02:36,090 --> 00:02:39,300 The third option we have is what's known as RDP. 71 00:02:39,300 --> 00:02:41,670 Now, RDP or the Remote Desktop Protocol 72 00:02:41,670 --> 00:02:44,760 is a proprietary protocol that was developed by Microsoft 73 00:02:44,760 --> 00:02:47,250 to provide users with a graphical user interface 74 00:02:47,250 --> 00:02:50,160 to connect to another computer over a network connection. 75 00:02:50,160 --> 00:02:52,410 When it comes to Telnet and SSH, 76 00:02:52,410 --> 00:02:54,330 by default, they're only going to allow you 77 00:02:54,330 --> 00:02:56,940 to issue and receive text-based information. 78 00:02:56,940 --> 00:02:59,070 But with RDP, you can log in remotely 79 00:02:59,070 --> 00:03:01,710 to another window system no matter where it is in the world, 80 00:03:01,710 --> 00:03:02,790 and see their screen, 81 00:03:02,790 --> 00:03:05,580 and operate it just as if you were sitting in front of it. 82 00:03:05,580 --> 00:03:07,770 When it comes to RDP, you're going to operate 83 00:03:07,770 --> 00:03:12,000 the Remote Desktop Protocol over port 3389, 84 00:03:12,000 --> 00:03:13,560 and this RDP is designed 85 00:03:13,560 --> 00:03:15,480 to support different types of network topologies 86 00:03:15,480 --> 00:03:17,730 and multiple LAN protocols. 87 00:03:17,730 --> 00:03:20,040 RDP does allow for the encryption of data, 88 00:03:20,040 --> 00:03:22,080 it allows for smart card authentication, 89 00:03:22,080 --> 00:03:24,900 and bandwidth reduction mechanisms that make it suitable 90 00:03:24,900 --> 00:03:26,910 for managing Windows-based systems remotely, 91 00:03:26,910 --> 00:03:29,550 no matter where you're actually sitting in the world. 92 00:03:29,550 --> 00:03:31,140 In these days of cloud computing 93 00:03:31,140 --> 00:03:33,210 and server environments that are always remote, 94 00:03:33,210 --> 00:03:36,837 using something like RDP or SSH has become critical 95 00:03:36,837 --> 00:03:39,240 to be able to manage these remote servers. 96 00:03:39,240 --> 00:03:40,470 So remember, when it comes 97 00:03:40,470 --> 00:03:42,120 to remote access ports and protocols, 98 00:03:42,120 --> 00:03:44,340 there are three groups you have to remember, 99 00:03:44,340 --> 00:03:47,691 these are SSH, Telnet, and RDP. 100 00:03:47,691 --> 00:03:50,190 SSH, Telnet, and RDP are all integral 101 00:03:50,190 --> 00:03:51,900 for system administrators and users 102 00:03:51,900 --> 00:03:53,790 who need to manage their computers remotely 103 00:03:53,790 --> 00:03:54,840 either at a text-based, 104 00:03:54,840 --> 00:03:57,450 or graphical user interface environment. 105 00:03:57,450 --> 00:04:00,000 SSH operates over port 22, 106 00:04:00,000 --> 00:04:03,270 and it's the go-to for secure command line-based management. 107 00:04:03,270 --> 00:04:05,610 Telnet, which operates over Port 23, 108 00:04:05,610 --> 00:04:09,150 is a legacy method that is now largely replaced by SSH 109 00:04:09,150 --> 00:04:12,420 because Telnet does not operate in an encrypted manner. 110 00:04:12,420 --> 00:04:14,370 And the third one we have is RDP, 111 00:04:14,370 --> 00:04:17,430 which operates over Port 3389, 112 00:04:17,430 --> 00:04:19,560 and it's essential for secure graphical access 113 00:04:19,560 --> 00:04:21,300 to Windows-based systems. 114 00:04:21,300 --> 00:04:22,860 Remember to always choose the protocol 115 00:04:22,860 --> 00:04:24,660 that aligns with your security requirements, 116 00:04:24,660 --> 00:04:27,600 and the specific tasks that you need to accomplish at hand. 117 00:04:27,600 --> 00:04:30,300 As we continue to embrace remote working and management, 118 00:04:30,300 --> 00:04:32,430 understanding these remote access protocols 119 00:04:32,430 --> 00:04:34,080 is even more important than ever 120 00:04:34,080 --> 00:04:36,903 for us as IT professionals and network administrators.