+1 screenconnect ... we use it for almost exactly the same thing, supporting a 
mishmash of equipment across the hemisphere.  On-demand remote control under a 
single pane of glass for my techs.

From: listsadmin@lists.myitforum.com [mailto:listsadmin@lists.myitforum.com] On 
Behalf Of J- P
Sent: Tuesday, May 3, 2016 10:25 AM
To: NT <ntsys...@lists.myitforum.com>
Subject: RE: [NTSysADM] Looking for some ideas

Ive had success with screenconnect

https://www.screenconnect.com/


Jean-Paul Natola


________________________________
From: asbz...@gmail.com<mailto:asbz...@gmail.com>
To: ntsys...@lists.myitforum.com<mailto:ntsys...@lists.myitforum.com>
Subject: Re: [NTSysADM] Looking for some ideas
Date: Tue, 3 May 2016 14:04:35 +0000
While it will likely be impossible to get down to a single standard access 
configuration that you support, I think you should aim for 4 or 5, based on the 
most popular methods you support today.

Grandfather all of the existing folks in (to some point), or maybe just 
grandfather all the existing configurations in, but move towards something you 
could build redundancy for on the back-end.

If you want support for providing a set of standard, supported configs (let's 
say 5 of them), then simply price out two options:

A -- Building redundant VMs that can support 5 different remote access 
configurations (possible 10-15 VMs in total), and keep them live all at once.

B -- Building single or redundant VMs to cover all the various configurations 
and keep them online for patching, etc.

Show management plan B, indicating the need for security, etc.   When they push 
back, suggest plan A, with some approach to moving to a steady state with each 
client.

What you are looking to do will be manpower intensive and then require lots of 
custom automation to facilitate, making the whole process somewhat fragile.

Having a smaller number of supported configurations will allow for greater 
redundancy on your end, and facilitate patching and integration testing when 
new versions of components and devices come online.

Regards,
 ASB
 http://XeeMe.com/AndrewBaker<http://xeeme.com/AndrewBaker>
 Providing Expert Technology Consulting Services for the SMB market...
 GPG: 1AF3 EEC3 7C3C E88E B0EF 4319 8F28 A483 A182 EF3A



Sent with 
Mixmax<https://mixmax.com/s/WMB47Rd39yDNPFfWo?utm_source=mixmax&utm_medium=email&utm_campaign=signature_link&utm_content=sent_with_mixmax>
[https://app.mixmax.com/api/track/v2/WWKODxhUa4b1sDTWm/gIt92YuwWah12ZAVmbvpnYzFmI/i02bj5Sb1J3bmRXa51mLzR3cpxGQtRWYzl3c05mI]



On Mon, May 2, 2016 8:21 PM, Kurt Buff 
kurt.b...@gmail.com<mailto:kurt.b...@gmail.com> wrote:
The access (again, AFAIK) is pretty much all SSL VPN. But each rev of
each vendor's device introduces incompatibility, as does the
customer's requirements for AV on our support desktops.


This isn't a problem that's going to go away.


Kurt




On Mon, May 2, 2016 at 4:25 PM, Michael B. Smith 
<mich...@smithcons.com<mailto:mich...@smithcons.com>> wrote:
> I know that this won't be popular - but at some point you have to establish
> SOME set of supported environments.
>
>
>
> I like clients - and when I was in my early days, I would extend myself to
> do almost anything to retain a client - but now, it just isn't worth it.
>
>
>
> PPTP, L2TP (IPSec), SSL VPN, and DirectAccess - I support all these. If a
> client says they want something else, I say "I'm sorry, but this is what I
> support"...
>
>
>
> From: listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com> 
> [mailto:listsadmin@lists.myitforum.com]
> On Behalf Of Micheal Espinola Jr
> Sent: Monday, May 2, 2016 7:12 PM
> To: ntsys...@lists.myitforum.com<mailto:ntsys...@lists.myitforum.com>
> Subject: Re: [NTSysADM] Looking for some ideas
>
>
>
> I hope for and look forward to a healthy discussion about this! I've never
> come across one that comes to a conclusion.
>
>
> --
> Espi
>
>
>
>
>
> On Mon, May 2, 2016 at 3:01 PM, Kurt Buff 
> <kurt.b...@gmail.com<mailto:kurt.b...@gmail.com>> wrote:
>
> All,
>
> $Company has a set of support engineers whose job it is to connect
> with customer sites which run our product. There are over 50 of these
> customer sites, and of course we hope to get more.
>
> Our systems at the customer sites are not normally the customers' main
> set of IT resources, but are usually critical to their operations, so
> their IT staffs have their own opinions on how to grant access for us
> to their environments.
>
> Therefore, each site has different requirements for remote access,
> having a multitude of different VPN units (Sonicwall, Juniper, Cisco,
> etc.) and requirements for different brands of Antivirus installation,
> and whether or not split tunneling is allowed, etc.
>
> Currently our support engineers are using 3 desktop machines with
> varied OSes, and using a set of VMs running in VMware player, but not
> nearly enough of them, so that there are frequent conflicts in the
> configurations of the VMs, what with different versions of VPN and AV
> software.
>
> I expect normally no more than 4 or 5 VMs to be in use at a time - and
> usually only 1 or 2.
>
> My thought currently is to have a set of VMs (one per customer) on a
> small cluster in a DMZ - our support engineers would be able to access
> the host, start the required VM, and be on their way.
>
> My solution starts to run into conceptual problems, however, when I
> think about how to power down VMs that aren't in use, and also how to
> wake up VMs periodically so that they keep patches and antivirus
> updates. Are there products our there for a given platform that will
> detect VMs not in use and shut them down, and that will also wake
> those not running, to let them get patches and AV updates, then shut
> them down? I'm platform agnostic - we run both VMware (production) and
> Hyper-V (DMZ) here, and I don't care which one I implement.
>
> Of course, whatever solution is proposed should detect machines in
> use, and not shut them down.
>
> Thoughts, input, suggestions?
>
> Thanks,
>
> Kurt
>
>






Reply via email to