Windows Server 2008

1. WINDOWS SERVER 2008 2. WINDOWS 2008 Editions 3. WINDOWS 2008 Server Core 4. APPROX. COST OF WINDOWS SERVER 2008 5. Upgrade / Migrate 6. Upgrade from previous OS 7. WINDOWS SERVER 2008 INSTALLATION 8. Windows Server 2008 Activation 9. Activation Method 10. RAID 11. BACKUP and RECOVERY 12. Wbadmin 13. BACKUP Utility 14. Windows Recovery Environment 15. Server Roles for WINDOWS SERVER 2008 16. IP-ADDRESSING and IPV4 17. IPV6 18. Remote Desktop Connection 19. Steps for Remote Desktop Pc from Client PC 20. Remote Desktops 21. MANAGING SERVER CORE 22. TERMINAL SERVICES (TS) 23. TERMINAL SERVICES MANAGER 24. MANGAING FILE AND PRINT SERVERS 25. Share Folder 26. Attrib (Attribute) 27. Windows Registry 28. Disk Quotas 29. Disaster Recovery Tools 30. MMC 31. Remote Assistance 32. Signed & Unsigned Driver 33. Hardware Profile 34. CHKDSK.EXE(Check Disk) 35. Disk Defragmenter (DFRG.MSC) 36. ACTIVE DIRECTORY REVIEW 37. Introduction to AD 38. TRUST 39. FSMO 40. GC (GLOBAL CATALOG) Server 41. Site 42. AD replication 43. Backup of Active Directory (DC) 44. Understanding USER, GROUP & COMPUTER 45. Create Local User & Multiple Users 46. GROUP SCOPE 47. Public and Private key encryption 48. Trust concept of CA working 49. ETHERNET CARDS 50. Availability and Security 51. General Server Security Issues 52. OSI MODEL 53. Data Encapsulation 54. TCP/IP or DoD Model 55. Protocol Working at Host to Host (Transport) layer 56. NETWORK MONITOR 57. Internet Information Services 58. Monitoring Tools 59. DNS [Domain Name System] 60. DNS ZONE 61. Remote Access Authentication Process 62. Remote Access Interview Question & Answer part 1 Tutorials Interview Question & Answer part 2 Tutorials Interview Question & Answer part 3 Tutorials Interview Question & Answer part 4 Tutorials Interview Question & Answer part 5 Tutorials Interview Question & Answer part 6 Tutorials Interview Question & Answer part 7 Tutorials
Pr.Pg Next Pg

Remote Access Authentication Process tutorails

  • When you connect to the Internet, remote access authentication is a one-step process. Your computer presents credentials, typically a user name and password, that are acceptable to a remote access server at the Internet Service Provider(ISP), and you are granted a connection to the Internet.

  • When you connect to a corporate network that uses a Windows domain, a similar remote access authentication occurs. But in this case, a second step of authentication is required. After you have connected to the network, resources that you access, such as file and print servers, will ask your computer for its domain credentials on each attempt to access them. These domain network credentials may not be the same as the credentials required by the remote access server.


Password Authentication Protocol (PAP)

  • Password Authentication Protocol (PAP) is a simple authentication protocol in which the user name and password is sent to the remote access server in a plaintext (unencrypted) form. Using PAP is strongly discouraged because your passwords are easily readable from the Point-to-Point Protocol (PPP) packets exchanged during the authentication process. PAP is typically only used when connecting to older UNIX-based remote access servers that do not support any additional authentication protocols.


CHAP (Challenge Handshake Authentication Protocol)

  • An authentication protocol used by Microsoft remote access and Network Connections. Using CHAP, a remote access client can send its authentication credentials to a remote access server in a secure form. Microsoft has created a Windows-specific variant of CHAP called MS-CHAP.


Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)

  • Microsoft created MS-CHAP to authenticate remote Windows workstations, providing the functionality to which LAN-based users are accustomed while integrating the hashing algorithms used on Windows networks. Like CHAP, MS-CHAP uses a challenge-response mechanism to keep the password from being sent during the authentication process.

  • MS-CHAP uses the Message Digest 4 (MD4) hashing algorithm and the Data Encryption Standard (DES) encryption algorithm to generate the challenge and response and provides mechanisms for reporting connection errors and for changing the user's password


Microsoft Challenge Handshake Authentication

  • Windows XP supports Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2). MS-CHAP v2 provides mutual authentication, the generation of stronger initial data encryption keys for Microsoft Point-to-Point Encryption (MPPE), and different encryption keys for sent and received data. To minimize the risk of password compromise during a password change, support for older methods of the MS-CHAP password change are not supported.

  • Because MS-CHAP v2 is more secure than MS-CHAP, it is offered before MS-CHAP (if enabled) for all connections.

  • MS-CHAP v2 is supported by computers running Windows XP, Windows 2000, Windows 98, Windows Millennium Edition, and Windows NT 4.0. For computers running Windows 95, MS-CHAP v2 is only supported for VPN connections, not for dial-up connections.


Extensible Authentication Protocol (EAP)

  • The Extensible Authentication Protocol (EAP) is an extension to the Point-to-Point Protocol (PPP) that allows arbitrary authentication methods using credential and information exchanges of arbitrary lengths. EAP was developed in response to an increasing demand for authentication methods that uses other security devices and provides an industry-standard architecture for support of additional authentication methods within PPP. EAP is used while using SMART CARD & CERTIFICATES


Shiva Password Authentication Protocol (SPAP)

  • The Shiva Password Authentication Protocol (SPAP) is a simple encrypted password authentication protocol supported by Shiva remote access servers. With SPAP, the remote access client sends an encrypted password to the remote access server. SPAP uses a two-way encryption algorithm. The remote access server decrypts the password and uses the plaintext form to authenticate the remote access client.


Pr.Pg border                                              Next Pg