ALL >> Computers >> View Article
Guidelines For Using Connection Manager Profiles And Phone Books
Follow these guidelines:
If Connection Manager phone books are used and File Transfer Protocol (FTP) is used to update the MCP certification phone book files on the phone book server, be sure that the
FTP services are stopped or disabled after the phone book is transferred and that they are started only when new changes must be transferred.
Do not allow anonymous FTP access to the Phone Book Server (PBS).
Protect administrative connections to the PBS server using IPSec.
Protect Connection Manager profiles and the distribution process. This is important because:
Profiles contain scripts and access data that might provide an attacker with valuable information. Although connections are password protected, providing an attacker with all the server configuration information and access numbers reduces the amount of work the attacker has to do to successfully attack your network.
If an unauthorized individual is allowed to access and modify profiles, that person can mount a denial of service attack (by providing incorrect information in profiles that ...
... later get distributed to users and that don't work), weaken VPN communications (by configuring less secure options, such as weaker encryption strength), and access a lot of information that might provide Free Security+ practice exams ideas and data for other types of attacks.
Client configuration Considerations include:
Authentication selection for the client must match at least one of the approved authentication configurations on the server.
Encryption strength selection on the client must match at least one of the approved encryption strength settings on the server.
VPN protocol selection on the client must match at least one VPN protocol selected on the server.
If certificates are required, a valid certificate of the right type must be installed on the client computer or smart card.
A VPN client can be prevented from creating a new default route (one in which the client will be able to directly access the Internet and your intranet) in the Advanced TCP/IP Properties dialog box for the VPN connection. Figure 10-4 is a screen shot of this page with the Determining Routing For VPN Remote Access Clients check box deselected. If this setting is disabled, a route is created—it just does not become the default route. User selection of this element can be prevented MCSE 2003 certification by configuring Group Policy.
Add Comment
Computers Articles
1. Why To Choose Java Outsourcing Development For Your Project?Author: goodcoders
2. Why Use Expressjs Over Nodejs For Server-side Development?
Author: goodcoders
3. Why Use Kotlin Over Java For Android Development?
Author: goodcoders
4. 10 Ways To Get The Most Out Of Las Vegas Phone Repair
Author: Fones Gone Wild
5. Why The Discovery Phase Is Important To Your Software Development Project?
Author: goodcoders
6. Why Should Your Business Invest In An End-to-end Custom Software Solution?
Author: goodcoders
7. Why Small Businesses Are Developing Mobile Apps?
Author: goodcoders
8. What Should You Do If Your Laptop Stops Functioning?
Author: Joshua Kirby
9. How Customer Awareness Is Crucial For Buying Refurbished Laptops
Author: usedstore
10. It Staff Augmentation: A Model To Extend Your Team And Succeed
Author: ICSI
11. Why Should You Hire Managed It Services For Your Business?
Author: goodcoders
12. Why Should Enterprises Use Xamarin Forapp Development?
Author: goodcoders
13. Why Micro Teams Are The Future Of Software Development?
Author: goodcoders
14. Indicators That It's Time To Visit A Computer Repair Shop
Author: Anna Paquin
15. Can Mickey Mouse Power Cord Be Used As A Laptop Battery Charger?
Author: Jennifer Truong