ALL >> Business >> View Article
Selecting Vpn Protocols

In this practice, you will decide on the correct protocol for MCTS Certification different situations. If more than one protocol is possible, list both protocols as your answer. If you are unable to answer a question, review the lesson materials and try the question again. You can find answers to the questions in the "Questions and Answers" section at the end of the chapter.
Table 7-1 lists specific scenarios and provides a blank column for entering the correct VPN protocol for each situation.
The VPN server sits behind a NAT box.
Clients must connect to a device that is not compatible with the Microsoft L2TP/IPSec VPN.The VPN server must operate in an environment where there is no public key infrastructure and where it serves 1000 clients.Users must be able to use smart cards for authentication.Windows 98 Seecond Edition, Windows NT 4.0, and Win-dows 2000 Professional clients must be able to use the VPN.There is concern about the use of password-cracking soft-ware on captured VPN packets. 3DES is required for encryption.
Setting remote access account lockout ...
... has no impact on the setting in the Group Policy Account lockout policy, nor does a setting in Group Policy affect the remote access account lockout feature. Instead, you must edit the registry to turn on the feature and edit the registry to unlock locked accounts. Before deciding to set account lockout, you should consider the following points:Setting lockout to apply 70-620 after a specified number of attempts will foil password-
cracking attacks but will also lock out legitimate users until the lockout is reset.
A registry modification is required.
The modification is made on the RAS server if Windows authentication is used.The modification is made on the IAS server if RADIUS authentication is used.
The account lockout feature is not related to the Account Lockout Policy of Windows computers. The Account Lockout Policy works only for LAN connections,
while the account lockout feature works only with remote connection attempts.
Firewall configuration is important. Without proper configuration, one or both of two problems will exist. First, the VPN traffic, other required traffic, or both will not be able to pass through the firewall. Second, too much access will be granted to your network, thus making you more vulnerable to attack. It is not the designer's job to configure the firewall. Instead, the designer should supply the firewall administrator with the infor?mation necessary to provide secure remote access.
Tables 7-2 and 7-3 list the appropriate ports required to permit CompTIA. Remember to consider both incoming and outgoing traffic and apply filters that meet the requirements appropriately.
Add Comment
Business Articles
1. Seo Services For Small Business Indore: Boost Your Online PresenceAuthor: ayraphics
2. Women’s Tank Tops, Dresses, And Skirts In Encinitas, San Diego California
Author: Vikram kumar
3. Top Reasons To Use A Local Print Shop In San Francisco
Author: Bay Print Solutions
4. Quaker Oats Data Analytics On Amazon - The Oatmeal Deal Case Study
Author: Actowiz Metrics
5. Dubai Free Zone – A Hub For Business Growth And Global Opportunities
Author: David
6. What Is A Home Loan Calculator?
Author: Shreya Eppili
7. Using An Emi Calculator To Set Your Personal Loan Tenure During Application
Author: Shreya Eppili
8. Extract Wine Pricing Data Across Global Markets For Insights
Author: Den Rediant
9. Why A Tactical Picatinny Rail Forend Takes Your Remington 870 To The Next Level
Author: Slade Street Tactical
10. Powering Your Social Media Growth With Affordable Marketing Panels
Author: Smm Panel
11. Documenting Your Iso 50001 Procedures Effectively
Author: Sarah
12. Powering Progress With Quality Transformers– Kanyaka Parameshwari Engineering Pvt. Ltd
Author: Ojeshwani1
13. Cas No: 85118-00-9 Manufacturers
Author: vasista
14. How To Create Custom Clothing Online Without Compromising On Quality
Author: Guangzhou Beianji Clothing Co., Ltd
15. What Should You Know About Flat Roofing In Barrie?
Author: Ryan Seacrest