Routing and Remote Access Service
Encyclopedia
Routing and Remote Access Service (RRAS) is a Microsoft API and server software make it possible to create applications to administer the routing and remote access service capabilities of the operating system, to function as a network router, and developers can also use RRAS to implement routing protocols. The RRAS server functionality follows and builds upon the Remote Access Service
Remote Access Service
Remote Access Services refers to any combination of hardware and software to enable the remote access tools or information that typically reside on a network of IT devices. A RAS server is a specialized computer which aggregates multiple communication channels together...

 (RAS).
  1. Multiprotocol Router - The computer running RRAS can route IP, IPX
    IPX
    Internetwork Packet Exchange is the OSI-model Network layer protocol in the IPX/SPX protocol stack.The IPX/SPXM protocol stack is supported by Novell's NetWare network operating system. Because of Netware's popularity through the late 1980s into the mid 1990s, IPX became a popular internetworking...

    , and AppleTalk
    AppleTalk
    AppleTalk is a proprietary suite of protocols developed by Apple Inc. for networking computers. It was included in the original Macintosh released in 1984, but is now unsupported as of the release of Mac OS X v10.6 in 2009 in favor of TCP/IP networking...

     simultaneously. All routable protocols are configured from the same administrative utility.
  2. Demand-Dial Router
    Dial-on-demand routing
    Dial on Demand Routing is a routing technique where a network connection to a remote site is established only when needed. In other words, if the router tries to send out data and the connection is off, then the router will automatically establish a connection, send the information, and close the...

     - IP and IPX can be routed over on-demand or persistent WAN
    Wide area network
    A wide area network is a telecommunication network that covers a broad area . Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations...

     links such as analog phone lines or ISDN, or over VPN connections.
  3. Remote Access Server - provides remote access connectivity to dial-up or VPN remote access clients that use IP,IPX, AppleTalk, or NetBEUI
    NetBEUI
    NetBIOS Frames or NBF protocol is a non-routable network- and transport-level data protocol most commonly used as one of the layers of Microsoft Windows networking in the 1990s. NBF protocol or NetBIOS over IEEE 802.2 LLC is used by a number of network operating systems released in the 1990s, such...

    .


Routing services and remote access services used to work separately. Point-to-Point Protocol
Point-to-Point Protocol
In networking, the Point-to-Point Protocol is a data link protocol commonly used in establishing a direct connection between two networking nodes...

 (PPP), the protocol suite commonly used to negotiate point-to-point connections, has allowed them to be combined.

Abstract

Routing and Remote Access Service (RRAS) can be used to create client applications. These applications display RAS common dialog boxes, manage remote access connections and devices, and manipulate phone-book entries.

Routing and Remote Access Service Management Pack

The Routing and Remote Access Service Management Pack helps a network administrator monitor the status and availability of computers running Windows Server 2008 R2.

New Features in Windows 2008

  1. Server Manager - Application used to assist system administrators with installation, configuration, and management of other RRAS features.
  2. Secure Socket Tunneling Protocol
    Secure Socket Tunneling Protocol
    Secure Socket Tunneling Protocol is a form of VPN tunnel that provides a mechanism to transport PPP or L2TP traffic through an SSL 3.0 channel. SSL provides transport-level security with key-negotiation, encryption and traffic integrity checking...

  3. VPN enforcement for Network Access Protection
    Network Access Protection
    Network Access Protection is a Microsoft technology for controlling network access of a computer host based on the system health of the host, first introduced in Windows Server 2008....

     - Restricts vpn connections to only defined network services.
  4. IPv6 support - added PPPv6
    Point-to-Point Protocol
    In networking, the Point-to-Point Protocol is a data link protocol commonly used in establishing a direct connection between two networking nodes...

    , L2TP
    L2TP
    In computer networking, Layer 2 Tunneling Protocol is a tunneling protocol used to support virtual private networks . It does not provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide privacy.-History:Published in 1999...

    , DHCPv6
    DHCPv6
    DHCPv6 is the Dynamic Host Configuration Protocol for IPv6. Although IPv6's stateless address autoconfiguration can also be used to acquire IPv6 access, DHCPv6 may be a more suitable solution to assign addresses, nameservers and other configuration information as being done today with DHCP for IPv4...

    , and RADIUS
    RADIUS
    Remote Authentication Dial In User Service is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for computers to connect and use a network service...

     technologies allowing them to work over IPv6.
  5. New cryptographic support - Strengthened encryption algorithms to comply with government security requirements. In addition to removing algorithms which could not be strengthened.

Removed Technologies

  1. Bandwidth Allocation Protocol
    Bandwidth Allocation Protocol
    The Bandwidth Allocation Protocol, along with its control protocol, the Bandwidth Allocation Control Protocol, is used to add and remove links in a multilink bundle over PPP, and specifying which peer is responsible for making decisions regarding bandwidth management...

     (BAP). Removed from Windows Vista. Disabled in Windows Server 2008.
  2. X.25
    X.25
    X.25 is an ITU-T standard protocol suite for packet switched wide area network communication. An X.25 WAN consists of packet-switching exchange nodes as the networking hardware, and leased lines, Plain old telephone service connections or ISDN connections as physical links...

    .
  3. Serial Line Internet Protocol
    Serial Line Internet Protocol
    The Serial Line Internet Protocol is an encapsulation of the Internet Protocol designed to work over serial ports and modem connections. It is documented in RFC 1055...

     (SLIP). SLIP-based connections will automatically be updated to PPP-based connections.
  4. Asynchronous Transfer Mode
    Asynchronous Transfer Mode
    Asynchronous Transfer Mode is a standard switching technique designed to unify telecommunication and computer networks. It uses asynchronous time-division multiplexing, and it encodes data into small, fixed-sized cells. This differs from approaches such as the Internet Protocol or Ethernet that...

     (ATM).
  5. IP
    Internet Protocol
    The Internet Protocol is the principal communications protocol used for relaying datagrams across an internetwork using the Internet Protocol Suite...

     over IEEE 1394.
  6. NWLink
    NWLink
    NWLink is Microsoft's implementation of Novell's IPX/SPX protocols. NWLink includes an implementation of NetBIOS atop IPX/SPX.NWLink packages data to be compatible with client/server services on NetWare Networks. However, NWLink does not provide access to NetWare File and Print Services...

     IPX/SPX
    IPX/SPX
    IPX/SPX stands for Internetwork Packet Exchange/Sequenced Packet Exchange. IPX and SPX are networking protocols used primarily on networks using the Novell NetWare operating systems.-Protocol Layers:...

    /NetBIOS
    NetBIOS
    NetBIOS is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, NetBIOS is not a networking protocol...

     Compatible Transport Protocol.
  7. Services for Macintosh.
  8. Open Shortest Path First
    Open Shortest Path First
    Open Shortest Path First is an adaptive routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system . It is defined as OSPF Version 2 in RFC 2328 for IPv4...

     (OSPF) routing protocol component in Routing and Remote Access.
  9. Basic Firewall in RRAS (replaced with Windows Firewall).
  10. Static IP filter APIs for RRAS (replaced with Windows Filtering Platform APIs).
  11. The SPAP
    Password authentication protocol
    A password authentication protocol is an authentication protocol that uses a password.PAP is used by Point to Point Protocol to validate users before allowing them access to server resources. Almost all network operating system remote servers support PAP.PAP transmits unencrypted ASCII passwords...

    , EAP-MD5-CHAP
    Extensible Authentication Protocol
    Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and Point-to-Point connections. It is defined in RFC 3748, which made RFC 2284 obsolete, and was updated by RFC 5247....

    , and MS-CHAP
    MS-CHAP
    MS-CHAP is the Microsoft version of the Challenge-handshake authentication protocol, CHAP. The protocol exists in two versions, MS-CHAPv1 and MS-CHAPv2...

    authentication protocols for PPP-based connections.
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK