LAB # 6, 7, 8

Topics: Virtual private network, Internet, Microsoft Windows Pages: 3 (646 words) Published: January 28, 2015
Henry Cherry
IS 3220
Mr. Clark
August 9, 2014
Lab# 7 Implement a VPN Tunnel Between a Microsoft Server & Microsoft Client 1. What is the name of the Windows Server 2008 role you need to deploy to provide remote access services to clients? Explain why this service is important in a corporate environment. There are two different things that I checked off for configuring the VPN but the role that actually allows the VPN to work is the Routing and Remote Access Services role. 2. What was the IP host range that was allocated for the remote VPN client pool? The IP host range that was set up for the VPN had three IPs from 172.30.0.20 to 172.30.252 3. How many encryption settings are available from the remote access server? Which one is the best? Which one provides backward compatibility? There were three different encryption settings. They are Basic Encryption (MPPE 40-bit), Strong Encryption (MPPE 56-bit), and Strongest encryption (MPPE 128-bit). The strongest is the MPPE 128-bit encryption but it is not backwards compatible. The MPPE 40-bit is backwards compatible though. 4. During a remote access session how many times is a client asked to provide credentials? Is this an example of multi-factor authentication? Explain. I was only asked one time to login to the remote access through VPN, but if I was asked multiple times it would still not be considered multi-factor authentication. The reason for this is that multi-factor authentication is where there are different ways to authenticate who you are not just the same login over and over that is just considered authentication 5. Why is it important to use strong encryption in both authentication and communication protocols? Explain. It is important to have strong encryption in authentication and communication protocols because the information will be traveling over the public internet where it can be intercepted but with a strong encryption the people who have intercepted this information will not be able to...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Lab 7 & 8 Research Paper
  • Lab 7 & 8 Assignment Essay
  • Lab 7 Essay
  • ISS 418 Lab 7 and 8 Essay
  • Unit 7 Subnetting Lab 7 Essay
  • Lab 8 Essay
  • Lab 8 Essay
  • Unit 8 Lab 8 Essay

Become a StudyMode Member

Sign Up - It's Free