{"id":5254,"date":"2020-07-13T12:55:42","date_gmt":"2020-07-13T11:55:42","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5254"},"modified":"2024-03-04T16:53:35","modified_gmt":"2024-03-04T16:53:35","slug":"remote-access-protocols-complete-guide","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide","title":{"rendered":"A Complete Guide to Remote Access Protocols"},"content":{"rendered":"<div class=\"field field--name-body field--type-text-with-summary field--label-hidden field--item\">\n<p>As a managed services provider (MSP), you likely already work with remote access protocols on a daily basis. But learning how to best explain the various types of remote access protocols and their advantages and disadvantages to customers is critical in helping them understand your decisions\u2014and why they should trust you and your services. This guide will help define and lay out the different types of remote access protocols for your customers, and then recommend the remote access products that best suit their needs and help you facilitate effective remote access.<\/p>\n<p>A remote access protocol is responsible for managing the connection between a remote access server and a remote computer. It\u2019s necessary for desktop sharing and remote access for help desk activities. The primary remote access protocols in use today are the Serial Line Internet Protocol (SLIP), Point-to-Point Protocol (PPP), Point-to-Point Protocol over Ethernet (PPPoE), Point-to-Point Tunneling Protocol (PPTP), Remote Access Services (RAS), and Remote Desktop Protocol (RDP).<\/p>\n<h2><b>Types of remote access protocol<\/b><\/h2>\n<\/div>\n<div class=\"field field--name-field-blog-paragraphs field--type-entity-reference-revisions field--label-hidden field--items\">\n<div class=\"field--item\">\n<div class=\"paragraph paragraph--type--blog-section paragraph--view-mode--default clearfix\">\n<div>\n<div class=\"blog-section-content\">\n<h4>SERIAL LINE INTERNET PROTOCOL (SLIP)`<\/h4>\n<p>UNIX developed SLIP as a way of transmitting TCP\/IP over serial connections. SLIP operates at both the data link and physical layers of the OSI model and continues to be used today in many network operating systems, as well as UNIX.<\/p>\n<p>SLIP is associated with a low overhead and can be used to transport TCP\/IP over serial connections, but it doesn\u2019t feature packet addressing or error checking capabilities. You can only use it on serial connections, which is a notable restriction.<\/p>\n<p>To set up SLIP for a remote connection, you\u2019ll need a SLIP account on the host machine, as well as a batch file or script on the workstation. When you use SLIP to\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/securing-your-remote-access-are-you-managing-logins-effectively\">log in<\/a>\u00a0to a remote machine, you must configure a terminal mode after you\u2019ve logged into the remote site. This ensures the script can enter each parameter. If you don\u2019t use a script, you\u2019ll need to establish the connection and then open a terminal window so you can manually log in to the remote access server.<\/p>\n<hr \/>\n<p><strong>Set your sights on the future of the MSP industry with the first ever <a href=\"https:\/\/www.n-able.com\/resources\/the-msp-horizons-report-2024\" target=\"_blank\" rel=\"noopener\">MSP Horizons Report<\/a>, jointly produced by N\u2011able and international MSP-focused research firm, Canalys\u2026<\/strong><br \/>\n<a href=\"https:\/\/www.n-able.com\/resources\/the-msp-horizons-report-2024\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\" alt=\"\" width=\"1049\" height=\"443\" class=\"alignnone size-full wp-image-52700\" srcset=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg 1049w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-300x127.jpg 300w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-1024x432.jpg 1024w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-768x324.jpg 768w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-700x296.jpg 700w\" sizes=\"auto, (max-width: 1049px) 100vw, 1049px\" \/><\/a><\/p>\n<hr \/>\n<h4>POINT-TO-POINT PROTOCOL (PPP) AND PPPOE (POINT-TO-POINT PROTOCOL OVER ETHERNET)<\/h4>\n<p>PPP is a remote access protocol that allows you to implement TCP\/IP. It establishes a connection via point-to-point links (i.e., dedicated leased lines and dial-up). PPP is used most often for remote connections to LANs and ISPs.<\/p>\n<p>PPP utilizes the Link Control Protocol (LCP), which tests the link between client and PPP host and specifies PPP client configuration, to communicate between host and PPP client. LCP allows PPP to support authentication negotiation, in addition to compression and encryption negotiation between the client and the server, using encryption control protocols (ECPs) and compression control protocols (CCPs). PPP can support multiple network protocols by using protocol-specific network control protocols (NPCs). Because it can run over numerous physical media types and features error-checking functionalities, PPP has almost entirely replaced SLIP.<\/p>\n<p>PPP can also automatically configure TCP\/IP and alternative protocol parameters via IP control protocol (IPCP) NCP. Unfortunately, one of PPP\u2019s disadvantages is it attracts a high overhead and isn\u2019t compatible with certain older configurations.<\/p>\n<p>For technicians, PPP is generally considered easily configurable. Once you connect the router via PPP, it assigns all other TCP\/IP parameters for you. This is usually performed with the Dynamic Host Configuration Protocol (DHCP). DHCP is a protocol within TCP\/IP protocol stack that is responsible for assigning TCP\/IP addressing information. This includes subnet mask, DNS configuration, and host IP address. This information can be assigned via a LAN connection or a dial-up connection. Once you connect to an ISP, the DHCP server will likely provide your IP address.<\/p>\n<h4>POINT-TO-POINT TUNNELING PROTOCOL (PPTP)<\/h4>\n<p>PPTP is a remote access protocol, based on PPP, created by Microsoft. It\u2019s used to establish virtual connections across the internet via PPP and TCP\/IP, enabling two networks to use the internet as their WAN link while retaining the security benefits of a private network. PPTP is a great option because it\u2019s simple and secure.<\/p>\n<p>To use PPTP, you\u2019ll have to set up a PPP session between the server and the client, usually over the internet. Once the session is established, you\u2019ll create a second dial-up session. This dial-up session will use PPTP to dial through the existing PPP session.<\/p>\n<p>A PPTP session tunnels through an existing PPP connection, facilitating the creation of a secure session. This means you can use the internet to create a secure session between the server and the client. This type of connection is also called a virtual private network (VPN) and is less expensive than a direct connection.<\/p>\n<p>PPTP is a good choice for network administrators who want to connect multiple LANs but don\u2019t want to pay for dedicated leased lines. There are, however, a few disadvantages including:<\/p>\n<ul>\n<li>It\u2019s not a fully accepted standard<\/li>\n<li>It\u2019s harder to set up than PPP<\/li>\n<li>It isn\u2019t available on all server types<\/li>\n<\/ul>\n<p>You can implement PPTP in two ways. You can set up a server so it acts as the gateway to the internet and is responsible for all the tunneling. This means the workstations will run normally without the need for any extra configuration. You might use this method if the aim is to connect entire networks.<\/p>\n<p>The second way to use PPTP is to configure a single, remote workstation to make a connection with a corporate network via the internet. You should configure the workstation to connect via ISP, while configuring the VPN client with the VPN remote access server.<\/p>\n<h4>WINDOWS REMOTE ACCESS SERVICES (RAS)<\/h4>\n<p>Windows 2000 and Windows NT let users dial up a server and connect to both the server and the server\u2019s host network. This is referred to as RAS, which is used in smaller networks where a dedicated dial-up router would not be possible or practical. With a RAS setup, you can connect a modem to a Windows 2000 or Windows NT server and configure the modem as dial-out only, dial-up only, or a combination of the two.<\/p>\n<p>RAS can only provide LAN access to remote users. It doesn\u2019t let LAN users use the modem to, for example, dial their AOL account. If you want to achieve this, you\u2019ll need Microsoft\u2019s Shared Modem Services.<\/p>\n<h4>REMOTE DESKTOP PROTOCOL (RDP)<\/h4>\n<p>Finally, there is the RDP, which is very similar to the Independent Computing Architecture (ICA) protocol used by Citrix products. RDP is utilized to access Windows Terminal Services, which is a close relative of the product line provided by Citrix WinFrame.<\/p>\n<p>RDP offers the same core functions as ICA, although there are some limitations. RDP provides remote access for Windows clients only, while ICA can provide access for numerous platforms. ICA also offers support for automatic client updates, publishing an app to a web browser, and more.<\/p>\n<h2><b>The right remote access product for Your MSP<\/b><\/h2>\n<p>Beyond understanding the different types of remote access protocols, it helps to have the right tool to gain safe and efficient remote access to your customers\u2019 desktops. If you\u2019re looking for remote access products built with\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/10-tips-to-ensure-remote-access-security\">security<\/a>\u00a0 in mind,\u00a0to help you aid your customers, then you should choose SolarWinds<sup>\u00ae<\/sup>\u00a0Take Control.<\/p>\n<p><a href=\"https:\/\/www.solarwindsmsp.com\/products\/take-control?promo=blog\">SolarWinds Take Control<\/a>\u00a0offers remote access for help desks, desktop sharing, and\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/use-cases\/privileged-access-management\" target=\"_blank\" rel=\"noopener noreferrer\">privileged access management<\/a>\u00a0capabilities. It was designed to help IT server providers support their customers in a fast and intuitive way, on almost any platform. Take Control gives you access to deep diagnostics through a user-friendly dashboard and it\u2019s able to connect to devices in just a few seconds.<\/p>\n<p>Take Control was created to suit your technicians\u2019 workflows and designed to let you hit the ground running. No training or experience is required, making the process of providing\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/take-control\/use-cases\/remote-support-software-msps\">remote support<\/a>\u00a0less of a headache. You also have the option of configuring the tool to suit your needs\u2014you can even adopt personalized branding, which helps your customers keep your business top-of-mind.<\/p>\n<p>In addition, Take Control streamlines support operations by letting you configure workflows and customize your reports to suit your specific needs. It also gives your technicians crystal clear visibility into devices\u2014which is especially challenging when modern business customers use multiple monitors or other unique configurations. As a tool that is all about\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/logical-security-controls\">maximizing your control<\/a>, Take Control offers quality assurance features, including giving managers the opportunity to conduct session recordings and chat transcript searches.<\/p>\n<p>Perhaps most importantly, this remote access product is focused on security without compromising user-friendliness or range of functionality. It uses advanced encryption protocols as well as two-factor authentication and multilevel permissions to secure your remote access operations. It also gives you the option of automatic PIN and clipboard deletion once a session is complete. To start seeing the benefits today, access a\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/take-control\/trial?promo=blog\">14-day free trial here<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A Recovery Point Objective (RPO) determines how much data the business is willing to lose in the event of a failure. A Recovery Time Objective (RTO) determines how much time&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5254","post","type-post","status-publish","format-standard","hentry","topic-remote-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A Complete Guide to Remote Access Protocols - N-able<\/title>\n<meta name=\"description\" content=\"Read about remote access protocols and how MSPs can best utilize them to deliver a high level of security and efficiency.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Complete Guide to Remote Access Protocols - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about remote access protocols and how MSPs can best utilize them to deliver a high level of security and efficiency.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-13T11:55:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-04T16:53:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"7\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"A Complete Guide to Remote Access Protocols\",\"datePublished\":\"2020-07-13T12:55:42+01:00\",\"dateModified\":\"2024-03-04T16:53:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide\"},\"wordCount\":1502,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"articleSection\":[\"Remote Management\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide\",\"name\":\"A Complete Guide to Remote Access Protocols - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"datePublished\":\"2020-07-13T12:55:42+01:00\",\"dateModified\":\"2024-03-04T16:53:35+00:00\",\"description\":\"Read about remote access protocols and how MSPs can best utilize them to deliver a high level of security and efficiency.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Remote Management\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/remote-management\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Complete Guide to Remote Access Protocols\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Complete Guide to Remote Access Protocols - N-able","description":"Read about remote access protocols and how MSPs can best utilize them to deliver a high level of security and efficiency.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide","og_locale":"de_DE","og_type":"article","og_title":"A Complete Guide to Remote Access Protocols - N-able","og_description":"Read about remote access protocols and how MSPs can best utilize them to deliver a high level of security and efficiency.","og_url":"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-07-13T11:55:42+00:00","article_modified_time":"2024-03-04T16:53:35+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"7\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"A Complete Guide to Remote Access Protocols","datePublished":"2020-07-13T12:55:42+01:00","dateModified":"2024-03-04T16:53:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide"},"wordCount":1502,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","articleSection":["Remote Management"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide","url":"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide","name":"A Complete Guide to Remote Access Protocols - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","datePublished":"2020-07-13T12:55:42+01:00","dateModified":"2024-03-04T16:53:35+00:00","description":"Read about remote access protocols and how MSPs can best utilize them to deliver a high level of security and efficiency.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/remote-access-protocols-complete-guide#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Remote Management","item":"https:\/\/www.n-able.com\/de\/blog\/category\/remote-management"},{"@type":"ListItem","position":2,"name":"A Complete Guide to Remote Access Protocols"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5254"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5254\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}