tailieunhanh - Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 8

Module 8: Configuring virtual private network access for remote clients and networks. This module explains how to provide access to the internal network for remote users while maintaining network security by implementing a virtual private network (VPN). The module shows how to configure ISA Server 2004 to provide a VPN solution. | Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks Overview Virtual Private Networking Overview Configuring Virtual Private Networking for Remote Clients Configuring Virtual Private Networking for Remote Sites Configuring VPN Quarantine Control Using ISA Server 2004 Lesson: Virtual Private Networking Overview What Is Virtual Private Networking? VPN Protocol Options VPN Authentication Protocol Options VPN Quarantine Control Virtual Private Networking Using Routing and Remote Access Virtual Private Networking Using ISA Server 2004 Benefits of Using ISA Server for Virtual Private Networking What Is Virtual Private Networking? ISA Server Branch Office VPN Protocol Options Factor PPTP advantages and disadvantages L2TP/IPSec advantages and disadvantages Client operating systems supported Windows 2000, Windows XP, Windows Server 2003, Windows NT Workstation , Windows ME, or Windows 98 Windows 2000, Windows XP, or Windows Server 2003 Certificate support Requires a certificate infrastructure only for EAP-TLS authentication Requires a certificate infrastructure or a pre-shared key Security Provides data encryption Does not provide data integrity Provides data encryption, data confidentiality, data origin authentication, and replay protection NAT support To locate PPTP-based VPN clients behind a NAT, the NAT should include an editor that can translate PPTP To locate L2TP/IPSec–based clients or servers behind a NAT, both client and server must support IPSec NAT-T VPN Authentication Protocol Options Authentication protocol Considerations PAP Uses plaintext passwords and is the least secure authentication protocol SPAP Uses a reversible encryption mechanism employed by Shiva CHAP Requires passwords stored by using reversible encryption Compatible with Macintosh and UNIX-based clients Data cannot be encrypted MS-CHAP Does not require that passwords be stored by using reversible encryption Encrypts data MS-CHAPv2 Performs mutual . | Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks Overview Virtual Private Networking Overview Configuring Virtual Private Networking for Remote Clients Configuring Virtual Private Networking for Remote Sites Configuring VPN Quarantine Control Using ISA Server 2004 Lesson: Virtual Private Networking Overview What Is Virtual Private Networking? VPN Protocol Options VPN Authentication Protocol Options VPN Quarantine Control Virtual Private Networking Using Routing and Remote Access Virtual Private Networking Using ISA Server 2004 Benefits of Using ISA Server for Virtual Private Networking What Is Virtual Private Networking? ISA Server Branch Office VPN Protocol Options Factor PPTP advantages and disadvantages L2TP/IPSec advantages and disadvantages Client operating systems supported Windows 2000, Windows XP, Windows Server 2003, Windows NT Workstation , Windows ME, or Windows 98 Windows 2000, Windows XP, or Windows Server 2003 Certificate support

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.