Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint


Q.What two types of authentication can be used with an RAS server?
A.Authentication can be handled by the local Routing and Remote Access service or by a server running the Network Policy Server service as a RADIUS server. If RADIUS authentication is used, the RAS server becomes a client of the NPS (RADIUS) server.
Q.How are remote users authenticated when authentication is handled by the RAS server?
A.A number of different authentication protocols are available to authenticate remote users to a dial-in RAS server. These protocols provide different strengths of authentication. The Extensible Authentication Protocol provides the strongest authentication and is followed by the MS-CHAP V2 and MS-CHAP protocols. The weakest form of authentication is to configure unauthenticated access, which means that no protocol is used to control authentication.
Q.How are remote access clients configured in the domain?
A.The Active Directory Users and Computers snap-in is used to configure user settings related to remote access.
Q.What are the tunneling protocols used to provide a secure tunnel through the Internet for a client connection to your RAS server?
A.Windows Server 2008 provides three tunneling protocols for VPN: Secure Socket Tunneling Protocol (SSTP), Point-to-Point Tunneling Protocol (PPTP), and Layer 2 Tunneling Protocol (L2TP).


You are currently reading a PREVIEW of this book.


Get instant access to over $1 million worth of books and videos.


Start a Free 10-Day Trial

  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint