MCITP Server Administrator RAID Configurations

Kerberos Kerberos is the default authentication protocol for any Windows 2000/2003/2008/ Vista/XP pc. If Kerberos fails, the personal computer will automatically switch to NT LAN Man- ager (NTLM) authentication. Kerberos is really a widely supported open typical that delivers fantastic security along with a good deal of flexibility. Considering that its natively supported in Windows Server 2008, its the default authentication system. A large number of third-party IPsec goods incorporate Kerberos assistance. Certificates are public-key certificates utilized for authentication. Any time you use certificate-based authentication, every end with mcitp: server administrator
the connection can use the other individuals public certificate to verify a digitally signed message. This gives good security, with some added overhead and infrastructure specifications. As you add machines to a domain in Windows Server 2008, theyre automatically issued machine certificates (which apply to distinct com- puters in lieu of users) which can be applied for authentication; if you’d like to permit users and computers from other domains or organizations to connect for your IPsec machines, youll should explore certificate solutions that enable cross-organization certification.

Preshared keys Preshared keys are reusable passwords. The preshared important itself is often a word, code, or phrase that each computers know. The two machines use this password to establish a trust, but they dont send the plain-text phrase over the network. On the other hand, the unencrypted crucial is stored in Active Directory, so Microsoft recommends mcitp certificate
against making use of it in production (for the reason that anybody who can see the important can impersonate you or the remote laptop or computer). Most of the time you use this mode only if you have to speak to a third-party IPsec product that doesnt yet support certificate or Kerberos authentication.

Summary

A number of the necessary topics covered in this chapter included how TCP/IP could be the principal pro- tocol in use currently, and Microsoft encourages you to make use of TCP/IP exclusively, if conceivable. You also learned that the 32-bit IPv4 address is often a structured and hierarchical address that is definitely applied to uniquely determine just about every machine on a network. You learned how to establish attainable IP addresses and implement subnetting. In addition, you learned how the new layer three IPv6 protocol is implemented such as the structure of your IPv6 address. Lastly, we discussed the new functionality included in IPv6 addressing too as a number of Windows Server 2008 integration/ migration implementations.

This chapter also examined how IPsec provides increased network security by delivering or requiring authentication and/or encryption over the standard IP protocol.

Processing your request, Please wait....

Leave a Reply