ALL >> Computers >> View Article
Designing A Remote Access Policy
In this practice, you will design remote access policies to the specific conditions given to you. Read the 70-291 and then answer the question that follows. If you are unable to answer the question, review the lesson materials and try the question again. You can find the answer to the question in the "Questions and Answers" section at the end of the chapter.
You must refuse connections if MS-CHAP or PAP is used for authentication. You must grant access if other authentication protocols are used, if the connection is requested during the normal business hours of 9 a.m. to 5 p.m., or if the user is a member of the Dial-Up Windows group and encryption is used. You can assume all user accounts have been configured to Control Access Through Remote Access Policy.
Figure 10-16 shows how IAS can be used as a RADIUS proxy with multiple forests. Remote access requests are received by an IAS proxy. The domain name portion of the user name is used to determine which I CompTIA Security+ Exam server to send the request to. The figure represents ...
... the configuration for Humongous Insurance, which has a second forest for its Contoso Research division. The IAS proxy is configured to send requests from employees of Humongous Insurance to an IAS server in the Humongous Insurance forest and from employees of Contoso Research to an I AS server in the Contoso forest.
IAS is a Microsoft implementation of RADIUS. RADIUS is an IETF standard for manag?ing remote access to net-works. IAS can be used for many purposes, including:
Providing centralized authentication, authorization, and accounting for remote access connections.
Allowing one remote access server or RADIUS server to provide centralized authentication or accounting for remote access connections, while allowing
another remote access computer or RADIUS server to provide the service not provided by the first. (For example, a RADIUS server at an ISP can provide authentication, while a RADIUS server on the organization's network can provide accounting.)
Supporting 802.Ix authentication for wireless connections and authenticating switches.
Serving as a RADIUS proxy and directing connection requests to CCNA exam servers.
Providing Network Access Quarantine Control.
Add Comment
Computers Articles
1. Rental Management Software: A Complete Solution For Car, Property, And Coworking SpaceAuthor: RentAAA
2. The Ai Revolution: What’s Coming In 2025
Author: Ben Gross
3. The Rising And Falling Trends Of Graphic Card Prices In 2024
Author: Alahdeen
4. What Is Test-driven Development And Which Three Rules Does It Follow?
Author: Byteahead
5. What Is Web Application Architecture?
Author: goodcoders
6. Understanding How Wifi Works: The Wireless Connection Process Explained
Author: Kr
7. What’s Coming In Cybersecurity For 2025?
Author: Ben Gross
8. Hire Magento Expert In India
Author: Yuvraj Raulji
9. Discovering Everything About C15 Power Cables
Author: Jennifer Truong
10. Want To Get Long-distance Power? Time To Grab Extension Power Cords
Author: Jennifer Truong
11. Best Android Development Tools To Use
Author: Best Android Development Tools To Use
12. Choosing The Right Kansas City Web Design Partner For Your Business Success
Author: naviworld1h
13. The Importance Of Choosing The Right Kansas City Ecommerce Developer And Logo Design Expert
Author: naviworld1h
14. Top Mobile App Companies And Developers In Kansas City
Author: naviworld1h
15. Boost Your Business With A Leading Web Design Company In Kansas City
Author: naviworld1h