8-9 Flashcards
collection
An entity that contains remote access servers. Each collection allows specific groups of users in your Active Directory domain access to Remote Desktop
constraint
A section of a remote access policy that contains characteristics that must be met for remote access.
demand-dial interface
An interface that automatically creates a VPN connection to a NAT router when it receives traffic destined for a network.
demarc
The point in a network infrastructure that connects to the ISP using a last mile technology.
demarcation point
The point in a network infrastructure that connects to the ISP using a last mile technology.
dial-in permission
Permission to access a network remotely.
dial-up remote access
Access used before Internet access became common. In this case
DirectAccess
A remote access technology that automatically creates IPSec tunnels to a remote access server when remote access clients are outside of the organization.
DirectAccess Connectivity Assistant
A tool administrators use to improve an enterprise’s DirectAccess connection.
Generic Routing Encapsulation (GRE)
A protocol that provides a private
Gigabit Passive Optical Network (GPON)
A last mile technology that uses fiber optic cable.
Internet Key Exchange version 2 (IKEv2)
An enhancement to IPSec that provides VPN tunneling with faster speeds compared to L2TP. It uses 256-bit encryption keys and requires that remote access clients and servers authenticate to each other using an IPSec encryption certificate or preshared key.
IP Security (IPSec)
A secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks.
last mile technology
A technology that spans the “last mile” between the Internet and the organization.
Layer Two Tunneling Protocol (L2TP)
A VPN protocol developed by Microsoft and Cisco. It provides for tunneling only and relies on IP Security (IPSec) for the encryption of data packets using encryption keys varying in length from 56 to 256 bits. To participate in an L2TP VPN
long-range Wi-Fi
A last mile technology that uses radio wireless
Microsoft Point-to-Point Encryption (MPPE)
An encryption technique used in PPTP. Although MPPE supports encryption keys varying in length from 40 to 128 bits
Network Connectivity Assistant
A DirectAccess service that probes a network location server using HTTPS each time a client network interface is activated on a network to determine whether the client is located on a network outside the organization.
network location server
A website that is used to detect whether DirectAccess clients are located in the corporate network. Clients in the corporate network do not use DirectAccess to reach internal resources
Network Policy and Access Services
A component of Windows Server. It replaces the Internet Authentication Service (IAS) from Windows Server 2003. NPAS helps an administrator safeguard the health and security of a network.
Network Policy Server
NPS is installed when you install the Network Policy and Access Services (NPAS) feature in Windows Server 2016 and Server 2019. NPS allows you to create and enforce organization-wide network access policies for connection request authentication and authorization.