UEU-co logo


Previous Page Next Page


Q. What two types of authentication can be used with an RAS server?
A. Authentication can be handled by the local Routing and Remote Access service or by a server running the Network Policy Server service as a RADIUS server. If RADIUS authentication is used, the RAS server becomes a client of the NPS (RADIUS) server.
Q. How are remote users authenticated when authentication is handled by the RAS server?
A. A number of different authentication protocols are available to authenticate remote users to a dial-in RAS server. These protocols provide different strengths of authentication. The Extensible Authentication Protocol provides the strongest authentication and is followed by the MS-CHAP V2 and MS-CHAP protocols. The weakest form of authentication is to configure unauthenticated access, which means that no protocol is used to control authentication.
Q. How are remote access clients configured in the domain?
A. The Active Directory Users and Computers snap-in is used to configure user settings related to remote access.
Q. What are the tunneling protocols used to provide a secure tunnel through the Internet for a client connection to your RAS server?
A. Windows Server 2008 provides three tunneling protocols for VPN: Secure Socket Tunneling Protocol (SSTP), Point-to-Point Tunneling Protocol (PPTP), and Layer 2 Tunneling Protocol (L2TP).
Previous Page Next Page

Leave a Reply

Time limit is exhausted. Please reload the CAPTCHA.


apply_now Pepperstone Group Limited