Configure virtual private network (VPN) and routing Flashcards

1
Q

RAS

A

Remote Access Server

A RAS enables users to connect remotely to a network using various protocols and connection types. By connecting to the RAS over the Internet, users can connect to their organization’s network so that they can access data files, read e-mail, and access other applications just as if they were sitting at work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RRAS

A

Routing and Remote Access

RAS that also can manage routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

5 options for configuring a RRAS

A

Remote access (dial-up or VPN): Sets up the server to accept incoming remote access connections (dial-up or VPN).
• Network address translation (NAT): Sets up the server to provide NAT services to clients on the private network that need to access the Internet.
• Virtual private network (VPN) access and NAT: Sets up the server to support incoming VPN connections and to provide NAT services.
• Secure connection between two private networks: Sets up a demand-dial or persistent connection between two private networks.
• Custom configuration: Enables you to choose individual services, including NAT, LAN routing, and VPN access (see Figure 10-4).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Add-RemoteAccessLoadBalancerNode

A

Adds a server to the load balancing cluster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Add-VpnS2SInterface

A

Creates a site-to-site interface with the specified parameters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clear-VpnS2SInterfaceStatistics

A

Clears statistics for a site-to-site interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Connect-VpnS2SInterface

A

Connects a site-to-site interface that is currently not connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Disconnect-VpnS2SInterface

A

Disconnects a site-to-site interface that is currently connecte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disconnect-VpnUser

A

Disconnects a VPN connection originated by a specific user or originating
from a specific client computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Get-RemoteAccess

A

Displays the configuration of DirectAccess and VPN (both Remote Access VPN
and site-to-site VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Get-RemoteAccessConnectionStatistics

A

Displays the statistics of real-time, currently active
DirectAccess and VPN connections and the statistics of DirectAccess and VPN historical connections for a
specified time duration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Get-RemoteAccessConnectionStatisticsSummary

A

Displays the summary statistics of
real-time, currently active DirectAccess and VPN connections and the summary statistics of DirectAccess
and VPN historical connections for a specified time duration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Get-RemoteAccessHealth

A

Obtains the current health of a Remote Access deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Get-RemoteAccessLoadBalancer

A

Displays load balanced cluster settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Get-RemoteAccessUserActivity

A

Displays the resources accessed over the active
DirectAccess and VPN connections and the resources accessed over historical DirectAccess and VPN
connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Get-VpnAuthProtocol

A

Retrieves authentication parameters configured on a VPN server.

17
Q

Get-VpnS2SInterface

A

Retrieves configuration details for a site-to-site interface.

18
Q

Get-VpnS2SInterfaceStatistics

A

Retrieves statistics of a site-to-site interface.

19
Q

Get-VpnServerIPsecConfiguration

A

Gets IPsec parameters configured on the VPN server.

20
Q

Install-RemoteAccess

A

Performs prerequisite checks for DirectAccess to ensure that it can be
installed, installs DirectAcccess for remote access (includes management of remote clients) or for
management of remote clients only, and installs VPN (both Remote Access VPN and site-to-site VPN).

21
Q

Remove-RemoteAccessLoadBalancerNode

A

Removes a server from the network load balancing

(NLB) cluster

22
Q

Remove-VpnIPAddressRange

A

emoves an existing IPv4 address range from the pool for IP address assignment

23
Q

• Remove-VpnS2SInterface

A

Removes a specified site-to-site interface.

24
Q

Set-RemoteAccess

A

Modifies the configuration that is common to both DirectAccess and VPN, such
as SSL certificate, Internal interface, and Internet interface.

25
Q

Set-RemoteAccessLoadBalancer

A

Configures load balancing on the Remote Access server or the

cluster server.

26
Q

Set-VpnAuthProtocol

A

Sets the authentication method for incoming site-to-site VPN interfaces on
a Routing and Remote Access server.

27
Q

Set-VpnAuthType

A

Sets the authentication type to be used for connecting to a VPN.

28
Q

Set-VpnIPAddressAssignment

A

Configures the IPv4 address assignment method or the IPv6

prefix for IPv6 address assignment.

29
Q

Set-VpnS2SInterface

A

Modifies parameters for a site-to-site interface.

30
Q

Set-VpnServerIPsecConfiguration

A

Sets the IPsec parameters for a site-to-site server.

31
Q

Uninstall-RemoteAccess

A

Uninstalls DirectAccess and VPN, both remote access VPN and

site-to-site VPN.

32
Q

Add-VpnIPAddressRange

A

Adds a new IPv4 address range from which IPv4 addresses can be
assigned to VPN clients

33
Q

VPN

A

Virtual private networks (VPNs) link two computers or network devices through a wide- area network (WAN) such as the Internet. Because the Internet is a public network and is considered insecure, the data sent between the two computers or devices is encapsulated and encrypted.

34
Q

VPN connections provide

A

Encapsulation
Authentication
Data Encryption
Data Integrity

35
Q

VPN provides: Authentication

A

Proves the identity of the user or computer that tries to connection.

36
Q

VPN provides: Encapsulation

A

Private data is encapsulated or placed in a packet with a header containing routing information that allows the data to traverse the transit network such as the Internet.

37
Q

VPN provides: Data integrity

A

• Data integrity: Verifies that the data sent over the VPN connection has not been modified in transit. This is usually done with a cryptographic checksum that is based on an encryption key that is known only to the sender and receiver.

38
Q

types of security protocols used with MS RAS/VPN

A

PPTP (Point-to-Point Tunneling Protocol)
L2TP (Layer 2 Tunneling Protocol)
IKEv2 (Internet Key Exchange v2)
SSTP (Secure Socket Tunneling Protocol)