Lesson 8
Remote access protocols Conclusion
In this module, you were introduced to some of the new remote access protocols available in Windows 2000. This included the Extensible Authentication Protocol (EAP), L2TP/IPSec, PPTP, and the Mulitlink
Bandwidth Allocation Protocol (BAP). You learned about the basic capabilities of each of these protocols and where they will find their best use. You also learned about the Remote Access Dial-in User
Service (RADIUS) that allows you to use a platform-independent protocol to track accounting information related to your dial-in RAS clients. The RADIUS protocol is implemented as the Internet
Authentication Service in Windows 2000. Now you should be able to:
- Describe the new protocols that Windows 2000 supports
- Describe how EAP supports authentication
- Enable Remote Authentication Dial-in User Service
- Describe the function of IPSec
- Differentiate between L2TP and PPTP
- Enable BAP
New terms
Here a few terms that might be new to you:
- Internet Authentication Service (IAS): Software services that provide security and authentication for dial-in users.
- Internet Protocol Security (IPSec): A method of encrypting communications transparently so that they are protected during transit on the wire. Users and applications do not need to be IPSec aware to take advantage of IPSec.
- IP Security Policy Management: IPSec is a policy driven security infrastructure. IPSec policies consist of a series of decision trees that determine when and how IPSec should be applied.
- Network Address Translation (NAT): Private addresses cannot receive traffic from Internet locations. Therefore, if an intranet is using private addresses and communicating with Internet locations, the private address must be translated to a public address. A network address translator (NAT) is placed between an intranet that uses private addresses and the Internet, which uses public addresses. Outgoing packets from the intranet have their private addresses translated by the NAT into public addresses. Incoming packets from the Internet have their public addresses translated by the NAT into private addresses.
In the next module, you will learn how to configure the RRAS server to accept inbound and outbound connections. You will also see how you can use RAS policies to improve the efficiency and security of your RRAS installation.
Protocol Authentication - Quiz