Home: Authors: Deborah Timmons
Author and Writer

Status: Member since September 7, 2008
Location: United States of America
Articles: 128 Active Articles, resulting in 174328 views
Feedback: 2 comments on these 128 articles

Deborah Timmons is a Microsoft Certified Trainer and Microsoft Certified Systems Engineer. She came into the Microsoft technical field after six years in the adaptive technology field, providing technology and training for persons with disabilities. She is the President and co-owner of Integrator Systems Inc.

Patrick Timmons is a Microsoft Certified Systems Engineer + Internet. He has been working in the IT industry for approximately 15 years, specializing in network engineering, and has recently completed his Bachelor of Science degree, with a Major in Computer Science. Patrick is the CEO of Integrator Systems Inc., a company based in Ottawa, Ontario, Canada.Patrick and Deborah have four children--Lauren, Alexander, James and Katherine who take up a lot of their rare spare time.Integrator Systems Inc. designs and implements network solutions based on Microsoft and 3Com technology, produces custom applications based on customer needs, provides local and remote network troubleshooting and support, and provides courseware, training, and consultants to various horizontal and vertical markets. Integrator Systems is a Microsoft Certified Partner and 3Com Focus Partner. 

Troubleshoot Routing and Remote Access Routing 7.3.1 Troubleshoot Demand-dial Routing As mentioned before, the dial-up method is the good old stand by. Typically, you will either use POTS (plain old telephone service)/PSTN (public switched telephone service) modem or an ISDN adapter for point-to-point dial-up connections. This is the same method you use if you connect to the Internet using a modem and, depending on the DSL service, can be the method used there as well.
Configure Routing and Remote Access User Authentication: Configure Remote Access Authentication Protocols As you may recall, I earlier said that there are two conditions under which you can configure user accounts to control access through remote access policies. One is when the account used for access is local to the network access server, and the other is when the domain account is part of a domain in the proper functional level. When a domain is in mixed mode, meaning domain controllers from NT4,
There are Managing Routing and Remote Access Questions and answers.
Managing Routing and Remote Access: Introduction:In this section, we are going to explore RRAS, the Routing and Remote Access Service. RRAS is most commonly used as a remote access service (the RAS part), whether that is dial-up or VPN. What is often overlooked, however, is the routing functionality that Microsoft has included with the service.
Manage TCP/IP Routing: So far, we have explored what a routing interface is. As mentioned earlier, there are two other elements needed-the routing protocol and the routing table itself. A routing protocol is used whenever you want to maintain the routing tables dynamically, which is definitely preferred in most situations. Routing protocols allow routers to share routing information. The two routing protocols supported by Windows Server 2003 are RIP and OSP
Configuring Packet Filters As you may recall, you can configure TCP/IP filters at the host level with Windows Server 2003, but with RRAS you can also configure filters at the packet level on a per interface basis
Implement the Principle of Least Privilege: The Microsoft Principle of Least Privilege, simply stated, suggests that we should logon using an account that only has the privileges necessary to perform general user-related tasks, such as retrieval and saving of files, printing, etc. When a user wishes to perform administrative tasks, then the user can choose the appropriate tool from Administrative Tools
Configure Software Updates on Earlier Operating Systems For earlier Windows operating systems, Group Policy will not be effective. For Windows NT, Microsoft recommends using the System Policy editor. For all down level, clients use registry edits. Use these edits with caution because they can cause serious problems on a machine. The registry settings are stored in HKLM\Software\Policies\ Microsoft\Windows\WindowsUpdate\AU.
1. Which of the following does the Layer Two Tunneling Protocol use with Internet Protocol security (L2TP/IPSec) in 2003? A. User-level PAP authentication methods over a connection that is encrypted with IPSec
Configure security for backup operations Who can backup data? You must have certain permissions or be granted certain user rights to be able to back up files and folders on a Windows Server 2003 machine. Typically you must be a member of the Administrators Grou