Designing Secure Communications with External Organizations
11/05/2010

Set logging in the server properties (shown in Figure 7-11) so that it meets your security policy requirements. By default, only errors and warnings are recorded. This default setting will tell you only when communications are not happening.

Online PR News – 05-November-2010 – – Communications with external organizations should be 70-291(http://www.mcsa-70-291.com) secured. You might decide to provide the same level of security and the same configuration arrangements that you provide for the employees of your own company. Before deciding this, you should consider the design separately to determine whether additional security is required, whether a separate network infrastructure is required, or whether additional consider?ations are required because of the network infrastructure of the external organization.
Where RADIUS cannot be the authentication and accounting provideror it is chosen not to be the authentication and accounting provider—you can split these roles between RADIUS and Windows. You might choose, for example, to have centralized authentication, accounting using RADIUS, or both.
Use IAS for your RADIUS server, and use multiple 70-291 Exam(http://www.mcsa-70-291.com) to provide redundancy if required.
U When RADIUS messages include sensitive information such as the user password or encryption keys the fields are encrypted using the RADIUS shared secret. The secret is configured on the RADIUS server and the VPN.
If necessary or preferred, limit demand-dial connection times by using the hours of operations.
Set logging in the server properties (shown in Figure 7-11) so that it meets your security policy requirements. By default, only errors and warnings are recorded. This default setting will tell you only when communications are not happening. A good policy is to log all events so that you can record success?ful connections as well. This information will then be available for monitoring and for possible use in a forensic
Network+ certification(http://www.certtopper.com) examination if there is an attack or your sys-tem is successfully compromised.