|
validated writes, 788
verification interval, 447
version ID
NetBIOS name resolution and, 460
WINS replication and, 428, 473
video services, 26
virtual LAN (VLAN), 503
virtual memory (VM), 561–562
virtual private network (VPN)
adding demand-dial interface and, 261
configuring VPN connection from client computer, 266–267
connections, CMAK’s support of, 324
data encryption level for, 512–513
Internet-based VPNs, 301–303
IPSec encryption and, 715
packet filtering for, 269
protocols, 306–307, 328, 496–497
remote access, 488–489, 529
remote access with smart cards, 903–905
router-to-router VPNs, 263, 267–268, 303–306
security, 307–308
summary of, 326, 327
tunnels, 382
Windows Server 2003 VPN Server, installing, 263–265
virtual private network (VPN) remote access design, 495–500
access policies for, 500
computer certificates, installing, 497–499
firewall filters, configuring, 499–500
in general, 495
summary of, 530
VPN protocol selection, 496–497
virtual private network (VPN) server
firewall filters for, 499–500
role, 57
virtual server
in hot-standby server/N+1 deployment option, 650–651
in N-node failover pairs, 648, 649
in single node server cluster, 644–645
in single quorum device server cluster, 646
virtualization, 625
See also clustering
virus, 117
VLAN (virtual LAN), 503
VM (virtual memory), 561–562
VMware, 30
VMware Workstation 4.0, 353
volume shadow copy
backups and, 43
described, 22
system file backup with, 599
VPN. See virtual private network (VPN)
vulnerabilities, 115
|