When configuring remote access security, you must consider several aspects, the most fundamental of which involves configuring the types of authentication and encryption the server will use when accepting client requests. We will look at each of these in the following sections.
Controlling Server Security
The Security tab of the server’s Properties dialog box (see Figure 16.8) allows you to specify which authentication and accounting methods RRAS uses. You can choose one of two authentication providers by using the Authentication Provider drop-down list.
Your choices include the following: