Remote Access Role Flashcards

1
Q

What features does the Remote Access Role provide?

A
  • A virtual private network (VPN) gateway where clients can connect to an organization’s private network using the Internet.
  • Connect two private networks using a VPN connection using the Internet.
  • A dial-up remote access server, which enables users to connect to a private network using a modem.
  • Network address translation (NAT), which enables multiple users to share a single public network address.
  • Provide routing functionality, which can connect subnets and control where packets are forwarded based on the destination address.
  • Provide basic firewall functionality and allow or disallow packets based on addresses of source and/or destination and protocols.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What must be disabled while configuring RRAS?

A

Windows firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the five basic options for configuring RRAS through the wizard?

A
  • Remote access (dial-up or VPN): Sets up the server to accept incoming remote access connections (dial-up or VPN).
  • Network address translation (NAT): Sets up the server to provide NAT services to cli- ents on the private network that need to access the Internet.
  • Virtual private network (VPN) access and NAT: Sets up the server to support incom- ing VPN connections and to provide NAT services.
  • Secure connection between two private networks: Sets up a demand-dial or persistent connection between two private networks.
  • Custom configuration: Enables you to choose individual services, including NAT, LAN routing, and VPN access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PPTP (Point-to-Point Tunneling Protocol) - 7 Key Facts

A

Uses TCP

Encrypted using MPPE

Uses optional MS-CHAPv2 keys

Uses optional EAP-TLS keys

Easy to set up

Weak encryption

TCP Port 1723, Protocol 47

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

L2TP - 6 Key Facts

A

IPsec Method

Uses Pre-shared Key or Shared Secret

Encrypted with AES or 3DES

Uses IKE negotiation

UDP Port 500, 1701, 4500

Protocol 50

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IKEv2 - 5 Key facts

A

IKEv2 Internet Key Exchange

Uses IPsec ESP or AH

Encryption Keys, AES 256, AES 192, AES 128, 3DES

Supports Mobility

Supported on Win 7 and Up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSTP - 3 Key facts

A

Uses TCP Port 443

Passes traffic through firewalls and web proxies that block PPTP or L2TP

Uses HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two levels of authentication?

A

Computer Level - Certificates or pre-shared key

User Level - Username and Password using PPP (can be mutual)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What authentication methods are supported by Windows 8.1 and 2012 R2?

A

PAP - Plain text authentication

CHAP - md5 hashing

MS-CHAPv2 - Provides Mutual Auth, allows expired pw change

EAP-MS-CHAPv2 - Provies mutual auth. Allows 3rd party custom auth schemes (biomedics, smart cards)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are alternative methods to enable logging?

A
  • Execute the following command: Netsh ras set tracing * enabled
  • Set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ EnableFileTracing=1
How well did you know this?
1
Not at all
2
3
4
5
Perfectly