Remote Access

Why Trust Techopedia

What is Remote Access?

Remote access is the ability of a user or computing device to connect and interact with a specific computer, network, software application, or shared resource from a distant location.

Advertisements

Some types of remote access offer limited access to specific resources or functionalities. Other types can provide full access and allow users to control another computing device as if they were physically present.

How Remote Access Works

Key Takeaways

  • Remote access allows users to work, collaborate, and manage IT systems and networked devices from anywhere.
  • Authorized users and devices can use remote access to securely access and interact with IT resources as if they were physically present at the remote location.
  • Remote access facilitates telecommuting, online education, and IT management.
  • Depending on the implementation, remote access can provide full control over a system (full access) or limit access to specific applications or resources (partial access).
  • Remote access typically requires a reliable, fast Internet connection.

How Remote Access Works

Remote access establishes a connection between a user or device in one location and an information technology (IT) resource in a different location. The connection allows the user or device to interact with remote resources as if they were physically present.

Remote access typically requires a reliable, fast Internet connection. Organizations that deal with sensitive information or have high-bandwidth or low-latency requirements may benefit from providing remote access through a virtual private network (VPN) or leased line.

Remote Connections via VPNs

VPNs create a secure Internet connection by using network protocols supporting tunneling.

In a VPN tunnel, a VPN client places a data packet inside the payload of another packet that adheres to a different protocol. The encapsulating protocol encrypts the packet to ensure secure transmission over the network to a VPN server, where it is decrypted and forwarded to the intended destination.

Diagram showing how a VPN tunnel works, illustrating data flow from the user’s device through the VPN client, tunnel, VPN server, and to the internet.

The connection’s security from the server to the final destination depends on various factors, including the protocols used, the security measures implemented at the destination, and whether end-to-end encryption is employed.

Remote Access Types

Different types of remote access provide varying levels of control over the target system, network, or resource. This variation is largely determined by the specific purpose of the remote access method and the needs of the user or organization.

For example, the Remote Desktop Protocol (RDP) and Virtual Network Computing (VNC) offer high levels of control and allow users to interact with an entire desktop environment or remote access server as if they were physically present.

In contrast, other types of remote access will only provide limited control. For example, Software-as-a-Service (SaaS) platforms hosted on remote cloud servers can grant access to specific programs or virtualized environments without exposing the entire system. This ensures that users can perform specific tasks securely while reducing the risk of unintended changes to other parts of the system.

Remote Access Protocols

Protocols provide the rules and standards that enable secure and reliable communication between devices and networks in different locations. Protocols used for remote access include:

Network Protocols That Support Remote Access

RDP
Purpose: Remote desktop access to Windows systems

Port Number: TCP/3389

VNC
Purpose: Platform-independent remote desktop sharing

Port Number: TCP/5900 (default)

SSH
Purpose: Secure command-line access and tunneling

Port Number: TCP/22

IPsec
Purpose: Encrypted communication at the network layer

Port Number: Various (depends on configuration)

OpenVPN

Purpose: Secure and flexible VPN protocol

Port Number: UDP or TCP (configurable)

WireGuard

Purpose: Lightweight, high-performance VPN protocol

Port Number: UDP/51820 (default)

SSL/TLS

Purpose: Encryption for secure communication

Port Number: TCP/443 (commonly)

PPTP

Purpose: Older VPN protocol with limited security (no longer recommended)

Port Number: TCP/1723

HTTPS

Purpose: Secure, browser-based access to resources

Port Number: TCP/443

WebRTC

Purpose: Peer-to-peer browser-based communication

Port Number: N/A (peer-to-peer)

SFTP

Purpose: Secure file transfers over SSH

Port Number: TCP/22

FTPS

Purpose: Secure file transfers with SSL/TLS encryption

Port Number: TCP/990 (implicit) or TCP/21 (explicit)

Rsync

Purpose: File synchronization and backups, often over SSH

Port Number: TCP/873 (default)

Telnet

Purpose: Legacy remote command-line access

Port Number: TCP/23

Rlogin

Purpose: Legacy Unix-based remote access

Port Number: TCP/513 (default)

PC-over-IP

Purpose: Minimizes bandwidth use for graphics-intensive remote sessions

Port Number: TCP/4172 and UDP/4172 (commonly)

Uses of Remote Access

Arguably, the widespread success of remote access during COVID-19 turned it from a nice-to-have feature into a requirement for success.

During lockdowns, when employees worked from home, technical support teams leaned heavily on remote access tools to troubleshoot devices and maintain systems without requiring on-site visits. At the same time, educational institutions rapidly scaled their online learning platforms, and healthcare providers expanded telemedicine capabilities to meet public health needs.

Moving forward, remote access to digital resources from anywhere is expected to continue shaping how people interact with technology, both at home and in the workplace.

5 Best Practices for Providing Secure Remote Access

Organizations can feel confident about granting remote access by following these five best practices:

  1. Enforce strong authentication by implementing multi-factor authentication (MFA) whenever possible and requiring unique, strong passwords for all user accounts.

  2. Implement mechanisms like conditional access to ensure all devices used for remote access have up-to-date security software.

  3. Adhere to the Principle of Least Privilege (PoLP) and enforce Zero Trust.

  4. Consider making VPNs or authenticator apps that issue a time-sensitive remote access code a requirement for remote access.

  5. Monitor and analyze network traffic to identify suspicious activity, conduct regular security audits, and use intrusion detection and intrusion prevention systems to identify and respond to potential threats.

Remote Access Pros & Cons

Remote access can boost productivity, but its use can introduce security risks if not implemented correctly.

Pros

  • Enables access to files, software, Internet of Things (IoT) devices, and IT infrastructure without physical presence.
  • Reduces travel requirements.
  • Supports remote work environments.
  • Provides students access to learning materials on personal computers or mobile devices.
  • Facilitates access to critical healthcare resources during emergencies.
  • Mitigates risks from physical access in hazardous environments.
  • Can lead to significant long-term cost savings for organizations adopting remote work.

Cons

The Bottom Line

The definition of remote access has evolved significantly over the years due to technological advancements and shifts in how people work and use digital resources.

Initially, remote access was used mainly by IT professionals who needed to access mainframes from another location. With the rise of the Internet, however, it became possible for end-users to access corporate networks and resources from home, and VPNs became a standard way to secure remote access.

By the early 2010s, employees and IT administrators could use a variety of operating system utilities and third-party tools to facilitate remote access. By the time COVID-19 disrupted workplaces globally in 2020, many organizations and individuals were already relying on cloud services for some aspects of remote work, learning, and telemedicine.

FAQs

What is remote access in simple terms?

Why should I disable remote access?

What is required for remote access?

Should I allow remote access to my computer?

Advertisements

Related Terms

Margaret Rouse
Technology Expert
Margaret Rouse
Technology Expert

Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages.