You've also got BackOrifice 2000 at http://bo2k.sourceforge.net/.  Most
people think that it is a virus or a Trojan, but it actually is a very good
low profile - high security remote administration tool.

The BEST philosophy is to use 2 factor/strong authentication at the firewall
to allow any remote administration protocols through.  If you implicitly
trust your internal network, you may authorize your firewall to pass remote
admin protocols through without authentication.

Use a well respected/open protocol to protect all communications to/from the
DMZ server.  These protocols are IPsec (best), SSH v2 (OpenSSH implements),
and SSLv3 or TLS.  You notice that PPTP isn't there.

The DMZ server should use some sort of 2 factor/ strong authentication to
authenticate this connection from the remote client.

Then you can run any type of remote admin program across the channel.

REMEMBER:  Remote admin could be used by others the same way you use it if
you don't practice good security practices.

Best FREE solution:
Remote Admin software:  backorifice 2000
VPN software:  OpenSSH
Strong authentication:  Public key with OpenSSH

Ron Ogle
Rennes, France

> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, November 20, 2001 9:51 AM
> To: Matt LYNCH
> Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
> Subject: Antwort: Remote Admin of DMZ
> 
> 
> Hi,
> 
> a combination I think is very nice is OpenSSH (there is a 
> free NT Version 
> here: http://www.networksimplicity.com) in combination with 
> VNC or any 
> other remote tool

..........
> 
> 
> All machine are NT 4.0, I use a W2K desktop. (Free would be 
> nice, but I am
> also interested if there are commercial solutions available).
> 
> Thanks in advance
> 
> Matt
> 
> 
> 
> 

Reply via email to