123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Guidelines For Using Connection Manager Profiles And Phone Books

Profile Picture
By Author: joan
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Follow these guidelines:
If Connection Manager phone books are used and File Transfer Protocol (FTP) is used to update the MCP certification phone book files on the phone book server, be sure that the
FTP services are stopped or disabled after the phone book is transferred and that they are started only when new changes must be transferred.
Do not allow anonymous FTP access to the Phone Book Server (PBS).
Protect administrative connections to the PBS server using IPSec.
Protect Connection Manager profiles and the distribution process. This is important because:
Profiles contain scripts and access data that might provide an attacker with valuable information. Although connections are password protected, providing an attacker with all the server configuration information and access numbers reduces the amount of work the attacker has to do to successfully attack your network.
If an unauthorized individual is allowed to access and modify profiles, that person can mount a denial of service attack (by providing incorrect information in profiles that ...
... later get distributed to users and that don't work), weaken VPN communications (by configuring less secure options, such as weaker encryption strength), and access a lot of information that might provide Free Security+ practice exams ideas and data for other types of attacks.
Client configuration Considerations include:
Authentication selection for the client must match at least one of the approved authentication configurations on the server.
Encryption strength selection on the client must match at least one of the approved encryption strength settings on the server.
VPN protocol selection on the client must match at least one VPN protocol selected on the server.
If certificates are required, a valid certificate of the right type must be installed on the client computer or smart card.
A VPN client can be prevented from creating a new default route (one in which the client will be able to directly access the Internet and your intranet) in the Advanced TCP/IP Properties dialog box for the VPN connection. Figure 10-4 is a screen shot of this page with the Determining Routing For VPN Remote Access Clients check box deselected. If this setting is disabled, a route is created—it just does not become the default route. User selection of this element can be prevented MCSE 2003 certification by configuring Group Policy.

Total Views: 295Word Count: 371See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: