123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Designing A Remote Access Policy

Profile Picture
By Author: joan
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In this practice, you will design remote access policies to the specific conditions given to you. Read the 70-291 and then answer the question that follows. If you are unable to answer the question, review the lesson materials and try the question again. You can find the answer to the question in the "Questions and Answers" section at the end of the chapter.

You must refuse connections if MS-CHAP or PAP is used for authentication. You must grant access if other authentication protocols are used, if the connection is requested during the normal business hours of 9 a.m. to 5 p.m., or if the user is a member of the Dial-Up Windows group and encryption is used. You can assume all user accounts have been configured to Control Access Through Remote Access Policy.
Figure 10-16 shows how IAS can be used as a RADIUS proxy with multiple forests. Remote access requests are received by an IAS proxy. The domain name portion of the user name is used to determine which I CompTIA Security+ Exam server to send the request to. The figure represents ...
... the configuration for Humongous Insurance, which has a second forest for its Contoso Research division. The IAS proxy is configured to send requests from employees of Humongous Insurance to an IAS server in the Humongous Insurance forest and from employees of Contoso Research to an I AS server in the Contoso forest.

IAS is a Microsoft implementation of RADIUS. RADIUS is an IETF standard for manag?ing remote access to net-works. IAS can be used for many purposes, including:
Providing centralized authentication, authorization, and accounting for remote access connections.
Allowing one remote access server or RADIUS server to provide centralized authentication or accounting for remote access connections, while allowing
another remote access computer or RADIUS server to provide the service not provided by the first. (For example, a RADIUS server at an ISP can provide authentication, while a RADIUS server on the organization's network can provide accounting.)
Supporting 802.Ix authentication for wireless connections and authenticating switches.
Serving as a RADIUS proxy and directing connection requests to CCNA exam servers.
Providing Network Access Quarantine Control.

Total Views: 468Word Count: 350See All articles From Author

Add Comment

Computers Articles

1. Copilot For Dynamics 365 Field Service
Author: brainbell10

2. Dynamics 365 Field Service Capabilities
Author: brainbell10

3. Why Access Reviews Don’t Fail During Certification — They Fail After
Author: Soham Biswas

4. Trusted Caluanie Muelear Oxidize Manufacturer For Industrial Needs
Author: Roteschemie

5. Why Businesses Struggle With Fragmented Apps And How Full Stack App Development Fixes It
Author: david

6. Live Betting Data Monitoring From 1xbet
Author: Actowiz Metrics

7. Reliable Wholesale Caluanie Muelear Oxidize Supply With Uctr-gmbh
Author: UCTR-gmbh

8. Custom Crm Development Services For Businesses Struggling With Disconnected Workflows
Author: david

9. The Power Of Gis Mapping And Expert Drafting In Modern Telecom Network Deployment
Author: Itech Lance

10. Dynamics 365 Omnichannel For Customer Service
Author: brainbell10

11. Modernize Your Legacy Systems With Expert Visual Foxpro Migration Services By Tech Gazebos
Author: Tech Gazebos

12. Dynamics 365 Sales Is Important For Sales Teams
Author: brainbell10

13. Spark Matrix™: Workforce Iam
Author: Umangp

14. Mcdonald’s And Netflix Turn K-pop Fandom Into A Flavor-packed Battle Experience
Author: Md. Shakil Hasan

15. Find Epson Printer Dealers In Hyderabad Easily
Author: prime pos

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: