How Certificates Secure Communications
Web server applications can be secured using Secure Sockets Layer (SSL). Although Web server MCSE 2003 can provide server authentication to clients and securely share keys  for encrypting communications between clients and a server, SSL  client-side certificates provide more comprehensive security for  extranets. By giving client computers certificates, you allow clients to  authenticate to servers. This arrangement is even defined by some as a  type of VPN connection.
VPN protocols and authentication choices for remote access services  based VPNs, as discussed in previous lessons of this chapter, also  require certificates for computer and user authentication.
Use RADIUS for central authentication, authorization, and accounting for VPNs when multiple RRAS servers are required.
If the system is configured for RADIUS authentication and accounting,  the log files will be on the RADIUS server. You can find the log in the  System root\system32\logfiles folder. Authentication will still be  recorded in the MCSE Exams Windows event log.
Use the IP packet filters interface of the VPN connection and do not,  when remote access policies are used, use the settings in the profile of  the policy. The profile-based settings do not apply in a site-to-site  configuration.
A copy of the root CA certificate that is required is added to the  certificate store of the Web server or of the VPN router. This might be  the best solution when the number of certificates required is small.  Perhaps trust of one external organization’s certificate hierarchy is  required on one Web server. Perhaps the number of VPN routers that  require certificates is small for example, one VPN router connection  with one other company is all that is needed. However, this solution  does not scale well.

 Processing your request, Please wait....
 Processing your request, Please wait....
	