|
|
radio frequency communications, 389-390
radio waves, 386
RADIUS (Remote Authentication Dial-In User Service), 532
RAS
configuring, 534-541
introduction to, 528
passwords, 111
port configuration, 541-544
troubleshooting remote access problems, 582
troubleshooting routing and other issues, 588
vs. RRAS, 534
RAS servers, reason for use, 545
realm, domain and, 467
recovering key management server-issued keys, 241-244
Recovery Agent certificates, exporting, 108-110
Recovery Agent key, removing local computer, 108-111
recovery agents, EFS. See EFS,
Recovery Agent Wizard, 283
referral tickets, 467
registered port numbers, 712
Registry
backing up before changing, 277
configuring security, 48-50
editing to increase logging (fig.), 117
encryption and, 277
Windows NT 4.0, upgrading to Windows 2000, 112
Registry node, configuring, analyzing with Security Configuration and Analysis snap-in, 29
remote access
configuring network clients for secure, 573-582
firewall issues, 589
identifying remote users, 541
troubleshooting problems, 582-590
remote access authentication methods, 529-533
remote access policies
administrative models, 571-573
configuring, 562-563
user profiles, 566
remote access profiles
authentication, 570
dial-in constraints, 567-568
encryption, 570-571
IP configuration, 568
multilink configuration, 569
remote access servers, managing multiple, 539
Remote Access Service. See RAS
Remote Authentication Dial-In User Service (RADIUS), 532
Remote Client Protocols screen, 536-537
Remote Installation Service (RIS)
creating CD-based installation image, 162-166
installing and configuring, 158-162
slipstreaming installation media for deployment, 155-158
removing shortcuts to middleware, 135
renaming encrypted files, 278
replay cache in Kerberos v5, 462
requesting certificates, 217
Request Security (Optional) properties dialog box (fig.), 352
restoring, Certificate Services, 239-240
Restricted Groups, configuring, 45-46
Restricted Groups node, 29, 44-45
revoking certificates, 226-229
Rijndael symmetric encryption algorithm, 334
RIS. See Remote Installation Service (RIS)
risks, evaluating security, 344
Rivest, Shamir, and Adleman, 203
roaming described, 386
rogue servers, 459
routers, configuring for IPSec traffic, 369
Routing and Remote Access Console (fig.), 535
Routing and Remote Access Service. See RRAS
RRAS
described, 528
servers, VPN capabilities of, 546
troubleshooting remote access problems, 582
vs. RAS, 534
RSA algorithm, 203
rules
IP Security, 350
security, creating, 359
|
|