L


L2TP
See Layer 2 Tunneling Protocol (L2TP) .
local area network (LAN)
Communication system that typically has 10Mbps or higher bandwidth for the devices to communicate with one another.
Layer 2 Tunneling Protocol (L2TP)
VPN protocol that is used to authenticate the end points of a VPN.
linear model
Replication path in which the replicated data has to pass through multiple servers to reach the final server in the chain. Chaining the systems together in this fashion will cause propagation delays.
line-of-business applications
Applications that have been approved for use within the organization.
lockout policy
Settings that determine how many password attempts a user can make before the user s account becomes unavailable, and the length of time the account will remain unavailable.
loopback processing
Group Policy processing mode that specifies how the GPOs will be applied if the user and computer accounts do not reside within the same OU. The default setting is to use the GPO settings that apply to the computer s OU. You can configure the loopback processing to merge the settings from the user s OU with the computer s OU or completely replace the settings with those applied at the computer s OU.
low-level DNS security policy
Rules that dictate how the DNS server is used within the organization. These rules allow the DNS server to interact with the Internet.



MCSE
MCSE: Windows Server 2003 Active Directory and Network Infrastructure Design Study Guide (70-297)
ISBN: 0782143210
EAN: 2147483647
Year: 2004
Pages: 159
Authors: Brad Price, Sybex

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net