O'Reilly logo

MCTS Windows Server® 2008 R2 Complete: Study Guide by William Panek

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Configuring Security

When configuring remote access security, you must consider several aspects, the most fundamental of which involves configuring the types of authentication and encryption the server will use when accepting client requests. We will look at each of these in the following sections.

Controlling Server Security

The Security tab of the server’s Properties dialog box (see Figure 16.8) allows you to specify which authentication and accounting methods RRAS uses. You can choose one of two authentication providers by using the Authentication Provider drop-down list.

FIGURE 16.8 The Security tab of the RRAS server’s Properties dialog box

Your choices include the following:

  • Windows Authentication, a built-in authentication suite included ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required