Study The Physical Media of Connectivity: Practical No. 1
Study The Physical Media of Connectivity: Practical No. 1
Study The Physical Media of Connectivity: Practical No. 1
PRACTICAL NO. 1
The physical media of connectivity specifies the physical and electrical characteristics of
the connections that make up the network. It is made up of cables, connectors,
repeaters etc. It can be think of a hardware layer totally. When a message is to be
transmitted to some other station in a network the message is created at application
layer and travel through other layers to physical layer. The physical layer gets this
message packet at least, and it only needs to convert the characters of message packet
into electrical signals. This layer does not need to process routing information, compute
addresses, add check bits or other contents of a message packet, as all these jobs are
done by upper layers and then the packet is handed over to physical layer.
The RG value for cable types refers to its size. Coax cable types:
RG-58 /U - 50 ohm, with a solid copper wire core for thin ethernet.
RG-58 A/U* - 50 ohm, with a stranded wire core.
RG-58 C/U* - Military version of RG-58 A/U.
RG-59 - 75 ohm, for broadband transmission such as cable TV.
RG-62 - 93 ohm, primarily used for ArcNet.
RG-6 - Used for satellite cable (if you want to run a cable to a
satellite!).
RG-8 - 50 ohm thick ethernet.
RG-11 - 75 ohm thick ethernet.
COMPUTER NETWORK PROJECT FILE IT-366
Coaxial Cable
o Single mode cables for use with lasers has greater bandwidth and
costs more. Injection laser diodes (ILD) work with single mode
cable.
o Multimode cables for use with Light Emitting Diode (LED) drivers.
All signals appear to arrive at the same time. P intrinsic N diodes or
photodiodes are used to convert light to electric signals when using
multimode.
Cable Standards
interference.
STP Shielded twisted pair has a maximum cable length of 100 meters (328
feet). Data rate from 16 to 155 Mbps. Cables require special connectors for
grounding. Resists interference. Costs more than UTP or Thinnet, but not as
much as Thicknet or Fiber-optic.
COMPUTER NETWORK PROJECT FILE IT-366
PRACTICAL NO. 2
Because the only difference between the T568A and T568B pin/pair assignments are
that pairs 2 and 3 are swapped, a crossover cable may be envisioned as a cable with
one connector following T568A and the other T568B. Such a cable will work for
10BASE-T or 100BASE-TX. 1000BASE-T4 (Gigabit crossover), which uses all four
pairs, requires the other two pairs (1 and 4) to be swapped and also requires the
solid/striped within each of those two pairs to be swapped.
COMPUTER NETWORK PROJECT FILE IT-366
In practice, it does not matter if your Ethernet cables are wired as T568A or T568B, just
so long as both ends follow the same wiring format. It is just as valid to make a four-pair
crossover using T568A, or a two pair crossover using T568B, as it is to wire them the
way shown here. Typical commercially available "pre-wired" cables can follow either
format depending on who made them. What this means is that you may discover that
one manufacturer's cables are wired one way and another's the other way, yet both are
"correct" and will work. In either case, T568A or T568B, a normal (un-crossed) cable will
have both ends wired according to the layout in the Connection 1 column.
COMPUTER NETWORK PROJECT FILE IT-366
PRACTICAL NO. 3
Each computer in a LAN can effectively send and receive any information addressed to
it. This information is in the form of data 'packets'. The standards followed to regularize
the transmission of packets, are called LAN standards. There are many LAN standards
as Ethernet, Token Ring , FDDI etc. Usually LAN standards differ due to their media
access technology and the physical transmission medium. Some popular technologies
and standards are being covered in this practical.
There are different types of Media Access Control methods in a LAN, the
prominent ones are mentioned below :
device, until the frame reaches its destination. As the frame passes to
the intended recipient, the recipient sets certain bits in the frame to
indicate that it received the frame. The original sender of the frame
strips the frame data off the ring and issues a new token.
Topologies
The various ways in which cables are arranged constitute the topologies in a
LAN. Some of the Ethernet Topologies are described here :
o Bus Topology : Thick and thin Ethernet LANs use a bus topology, in
which devices connect directly to the backbone at both the physical
and logical levels . This type of LAN is very easy to use and cheap to
implement, but the problem is to troubleshoot and maintain.
Lan Components
o Router : The basic function of the router is to route the traffic from one
network to another network efficiently. It provide intelligent redundancy
and security required to select the optimum path. Usually routers are
used for connecting remote networks.
In recent years, with the boom in information technology leading to new GUI
based applications, more emphasis is being given to improving backbone and
inter LAN performance. This has lead to a new concept of connecting the
backbone through ATM switches. ATM ( asynchronous transfer mode) is the
switching technology where data is sent in forms of fixed length cells instead
of packets of various lengths. The speed of , in case of the ATM switches, is
comparatively much faster than the traditional Ethernet switch, as the network
overhead is less for ATMs.
Dial-up
Leased Line
ISDN
VSAT Technology
Cable Modem
COMPUTER NETWORK PROJECT FILE IT-366
o Leased line Leased line facility provides reliable, high speed services
starting as low as 2.4kbps and ranging as high as 45 Mbps (T3
service). A leased line connection is an affordable way to link two or
more sites for a fixed monthly charge. Leased Lines can be either fiber
optic or copper lines High capacity leased line service is an excellent
way to provide data, voice and video links between sites. Leased line
service provides a consistent amount of bandwidth for all your
communication needs.
ISDN BRI (Basic Rate ISDN) delivers two 64 kbps channels called B
channels and one at 16kbps (D channel). ISDN offers speed at 64
Kbps and 128 Kbps and is an alternative for those with a need for
greater Bandwidth than dial service.For utilizing the ISDN service, the
User needs to have an ISDN Terminal Adapter and an ISDN Card on
the system.
o Cable Modem The Internet Access over cable modem is a very new
and fast emerging technology. A "Cable Modem" is a device that
allows high speed data access via a cable TV (CATV) network. A cable
modem will typically have two connections, one to the cable wall outlet
and the other to the PC. This will enable the typical array of Internet
services at speeds of 100 to 1000 times as fast as the telephone
modem. The speed of cable modems range from 500 Kbps to 10
Mbps.
COMPUTER NETWORK PROJECT FILE IT-366
PRACTICAL NO. 4
switches. Small office, home office (SOHO) applications typically use a single
switch, or an all-purpose converged device such as gateway access to small
office/home office broadband services such as DSL router or cable, Wi-Fi
router. In most of these cases, the end user device contains a router and
components that interface to the particular physical broadband technology, as
in the Linksys 8-port and 48-port devices. User devices may also include a
telephone interface to VoIP.
If you are setting up a home or small office network an ideal solution is to use
a switch with 5 to 8 ports. Switches can be linked together as your network
expands. For a good entry level switch to meet this requirement we
recommend the 5 Port 10/100Base-TX Ethernet N-Way Switch (Part No.
32981) or the 8 Port 10/100Base-TX Fast Ethernet N-Way Switch (Part No.
32982)
If you require a larger switch with rackmount capability choose the 16 Port
10/100 Base-TX Fast Ethernet N-Way Switch (Part No. 25020) or 24 Port
10/100 Base-TX Fast Ethernet N-Way Switch (Part No. 25021).
Our GIGA N-Way Switches provide cost effective scalability of the network by
utilising the existing copper CAT5e cabling environment. Connectivity is not
sacrificed because the same cabling is used for Ethernet, Fast Ethernet and
Gigabit Ethernet.
PRACTICAL NO. 5
A router (pronounced /ˈraʊtər/ in the USA and Australia, /ˈruːtər/ in Canada, the UK, and
Ireland, these last two making a pronounced distinction with the tool used to rout wood)
is a networking device whose software and hardware are usually tailored to the tasks of
routing and forwarding information. For example, on the Internet, information is directed
to various paths by routers.
Routers connect two or more logical subnets, which do not necessarily map one-to-one
to the physical interfaces of the router. The term "layer 3 switch" often is used
interchangeably with router, but switch is a general term without a rigorous technical
definition. In marketing usage, it is generally optimized for Ethernet LAN interfaces and
may not have other physical interface types. In comparison, a network hub does not do
any routing, instead every packet it receives on one network line gets forwarded to all
the other network lines.
o Control plane, in which the router learns the outgoing interface that is
most appropriate for forwarding specific packets to specific destinations,
o Forwarding plane, which is responsible for the actual process of sending
a packet received on a logical interface to an outbound logical interface.
COMPUTER NETWORK PROJECT FILE IT-366
Types Of Routers
Routers may provide connectivity inside enterprises, between enterprises and the
Internet, and inside Internet Service Providers (ISP). The largest routers (for example
the Cisco CRS-1 or Juniper T1600) interconnect ISPs, are used inside ISPs, or may be
used in very large enterprise networks. The smallest routers provide connectivity for
small and home offices.
Routers intended for ISP and major enterprise connectivity will almost
invariably exchange routing information with the Border Gateway Protocol
(BGP).RFC4098 defines several types of BGP-speaking routers:
Within an ISP: Internal to the provider's AS, such a router speaks internal
BGP (iBGP) to that provider's edge routers, other intra-provider core routers,
or the provider's inter-provider border routers.
"Internet backbone:" The Internet does not have a clearly identifiable
backbone, as did its predecessors. See default-free zone (DFZ).
Nevertheless, it is the major ISPs' routers that make up what many would
consider the core. These ISPs operate all four types of the BGP-speaking
routers described here. In ISP usage, a "core" router is internal to an ISP, and
used to interconnect its edge and border routers. Core routers may also have
specialized functions in virtual private networks based on a combination of
BGP and Multi-Protocol Label Switching (MPLS). Routers are also used for
port fowarding for private servers.
COMPUTER NETWORK PROJECT FILE IT-366
PRACTICAL NO. 6
Study LAN(star topology) in labs.
STAR TOPOLOGY:
Star networks are one of the most common computer network topologies. In its
simplest form, a star network consists of one central switch, hub or computer, which
acts as a conduit to transmit messages.
The star topology reduces the chance of network failure by connecting all of the
systems to a central node. When applied to a bus-based network, this central hub
rebroadcasts all transmissions received from any peripheral node to all peripheral
nodes on the network, sometimes including the originating node.
The Star topology is now emerging as the most common network layout used today in
LAN layout. Each workstation is connected point-to-point to a single central location
COMPUTER NETWORK PROJECT FILE IT-366
FEATURES:
Goal
The main goal of this lab is to get you familiar with the equipment and the basics of
setting up a network. You become acquainted with setting up a LAN with a single IP
subnet and also learn how to how to analyze traffic using tcpdump and ethereal.
Prerequisites
Setup
The setup of this lab is very simple. You need to connect 4 Linux PCs in a star
topology using an Ethernet hub.
COMPUTER NETWORK PROJECT FILE IT-366
3. What is the MAC address of a network card? How does it differ from an IP address?
6. Design and implement a network that compound three star subnet. (based on S/W &
H/W techniques).
COMPUTER NETWORK PROJECT FILE IT-366
PRACTICAL NO. 7
Hardware Installation
Opening the Case Shut off the system if it is on .Remove all cables connecting to the
computer .Locate the screws holding the case cover in place on the frame. Remove the
screws attaching the cover to the frame .Many new systems have tight cases and/or
special cases. Removing the casing might require some prying. Use a flat-head
screwdriver to push the case open against the front panel. Seek assistance if you
cannot open the case alone. If the case seems really peculiar. Check your computer's
user manual first to see if they instruct you on how to open your computer.
Place the open computer frame on its side with the motherboard facing up. This means
you can see the motherboard from a bird's eye view. The motherboard is the biggest
board you can see within the frame. It usually covers an entire side and has other
smaller boards sticking up from it.Looking at the motherboard, try to locate the
expansion slots. Expansion slots are either long black strips or short white strips that
look like Lego blocks standing up. ISA slots are black. PCI slots are white. Open slots
are those that do not have other boards inserted in them.
Which lan card you having? Refer to the LAN card manual for the hardware installation.
and after hardware installation:
3. Next double click the Network icon to open the Network Control Panel
The Local Area Connection window will list the Network Adapters, Network Protocols,
and Network Clients that you have installed on your system. The specific configuration
will likely vary from the process.If TCP/IP is already installed, it will appear in the list of
installed protocols. Click once on the listed item Internet Protocol (TCP/IP) - this will
select this item. Now click the Properties button.Verify both the Obtain an IP address
COMPUTER NETWORK PROJECT FILE IT-366
automatically and the Obtain DNS server address automatically radio buttons are
selected. Click on the Advanced button.In the Advanced TCP/IP Settings window, click
on the DNS tab. Uncheck the box Register this connection's addresses in DNS toward
the bottom of the screen.Click OK to close the Advanced TCP/IP Settings window. Click
OK to close the Internet Protocol (TCP/IP) Properties window. Continue by clicking the
OK button to close the Local Area Connection Properties window. Close the Network
and Dial-up Connections window.
Determine which interface (ISA or PCI) your card uses. ISA is long and the gold
contacts are large. PCI is much shorter and smaller.Next, check to see if the expansion
slot opening next to the slot is covered. If it is, remove the cover by unscrewing it from
the frame or popping it out. (IMPORTANT: Keep the screw and the slot cover.) If you
have a new case that has slot covers built in you will have to remove them manually
with a screwdriver. Please refer to your user manual for details.When the slot cover has
been removed, insert your card into the expansion slot on the motherboard. Press firmly
so the entire part of the card that has the gold contacts goes completely into the
expansion slot on the motherboard and will go no further. Do not use any tools to try to
hammer the card in if it does not fit.
COMPUTER NETWORK PROJECT FILE IT-366
Make sure the side of the card resembling the expansion slot cover you just removed is
covering most of the open slot.Screw the card into place with the screw you removed
from the expansion slot cover or a new screw.
PRACTICAL NO. 8
As a Microsoft Windows 2000 Server support professional, one of your tasks may be to
install the operating system.
When you run the Windows 2000 Server Setup program, you must provide information
about how to install and configure the operating system. Thorough planning can make
your installation of W2K more efficient by helping you to avoid potential problems during
installation. An understanding of the configuration options will also help to ensure that
you have properly configured your system.
I won't go into that part right now but here are some of the most important things you
should take into consideration when planning for your Windows Server 2000 installation:
After you made sure you can go on, start the installation process.
You can install Windows 2000 Server in several methods - all are valid and good, it all
depends upon your needs and your limitations.
Boot from the 4 Setup Boot Disks, then insert the CD - No existing partition is
required.
Boot from an MS-DOS startup floppy, go to the command prompt, create a 4GB
FAT32 partition with FDISK, reboot, format the C partition you've created, then
go to the CD drive, go into the I386 folder, and run the WINNT.EXE command.
Run an already installed OS, such as Windows NT 4.0 Server. From within NT
4.0 go to the I386 folder in the W2K installation CD and run the WINNT32.EXE
command.
If you want to upgrade a desktop OS such as Windows 98 into Windows 2000
Professional you can follow the same procedure as above (You cannot upgrade
Windows 98 into W2K Server).
There are other non-manual installation methods, such as using an unattended file
along with a uniqueness database file, using Sysprep, using RIS or even running
unattended installations from within the CD itself, but we won't go into that right now.
It doesn't matter how you run the setup process, but the moment it runs - all setup
methods look alike.
The setup process begins loading a blue-looking text screen (not GUI). In that phase
you will be asked to accept the EULA and choose a partition on which to install W2K,
and if that partition is new, you'll be asked to format it by using either FAT, FAT32 or
NTFS.
2. You can press F6 if you need to install additional SCSI adapters or other mass-
storage devices. If you do you will be asked to supply a floppy disk with the
drivers and you CANNOT browse it (or a CD for that matter). Make sure you
have one handy.
4. Select To Setup W2K Now. If you want, and if you have a previous installation of
the OS, you can try to fix it by pressing R. If not, just press ENTER.
COMPUTER NETWORK PROJECT FILE IT-366
5. In case your server is a new one, or it is using a new hard disk that hasn't been
partitioned yet, you'll get a warning message. Read it, and if you want to
continue, press C.
6. Read and accept the licensing agreement and press F8 if you accept it.
7. Select or create the partition on which you will install W2K. Depending upon your
existing disk configuration choose one of the following:
If the hard disk is not yet partitioned, you can create and size the partition on
which you will install Windows 2000. Press C.
COMPUTER NETWORK PROJECT FILE IT-366
If the hard disk is new and you want to create a partition that will span the entire
hard disk's size - press Enter.
Other optionsL
If the hard disk is already partitioned, but has enough unpartitioned disk space,
you can create an additional partition in the unpartitioned space.
If the hard disk already has a partition that is large enough, you can install
Windows 2000 on that partition. If the partition has an existing operating system,
you will overwrite that operating system if you accept the default installation path.
However, files other than the operating system files, such as program files and
data files, will not be overwritten.
If the hard disk has an existing partition, you can delete it to create more
unpartitioned space for the new partition. Deleting an existing partition erases all
data on that partition.
If you select a new partition during Setup, create and size only the partition on which
you will install Windows 2000. After installation, use Disk Management to partition the
remaining space on the hard disk.
8. Select a file system for the installation partition. After you create the partition on
which you will install W2K, you can use Setup to select the file system with which
to format the partition. W2K supports the NTFS file system in addition to the file
allocation table (FAT) and FAT32 file systems. Windows Server 2003, Windows
XP Professional, Windows 2000, and Windows NT are the only Microsoft
operating systems that you can use to gain access to data on a local hard disk
that is formatted with NTFS. If you plan to gain access to files that are on a local
W2K partition with the Microsoft Windows 95 or Windows 98 operating systems,
you should format the partition with a FAT or FAT32 file system. We will use
NTFS.
9. Setup will then begin copying necessary files from the installation point (CD, local
I386 or network share).
10. Note: If you began the installation process from an MS-DOS floppy, make sure
you have and run SMARTDRV from the floppy, otherwise the copying process
will probably last more than an hour, perhaps even more. With SMARTDRV (or if
setup was run by booting from CD) the copying will probably last a few minutes,
no more than 5 max.
COMPUTER NETWORK PROJECT FILE IT-366
11. The computer will restart in graphical mode, and the installation will continue.
It will then begin to load device drivers based upon what it finds on your computer. You
don't need to do anything at this stage.
If your computer stops responding during this phase (the progress bar is stuck almost
half-way, and there is no disk activity) - shut down your computer and begin removing
hardware such as PCI and ISA cards. If it works for you then later try to figure out how
to make that specific piece of hardware work (it's probably not in the HCL).
Current System Locale - Affects how programs display dates, times, currency,
and numbers. Choose the locale that matches your location, for example, French
(Canada).
Current Keyboard Layout - Accommodates the special characters and symbols
used in different languages. Your keyboard layout determines which characters
appear when you press keys on the keyboard.
If you do need to make changes press Customize and add your System Locale etc.
Note for Hebrew users: In W2K it is NOT SAFE to install Hebrew language support at
this phase!!! Trust me, do it later. If you don't listen to me, good chances are that you'll
get ???? fonts in some Office applications such as Outlook and others.
Read the Install Hebrew on Windows 2000 page for more info.
If you'd like to skip this step in the future, please read Install Windows 2000 Without
Supplying the CD Key.
5. Type the computer name and a password for the local Administrator account.
The local Administrator account resides in the SAM of the computer, not in Active
Directory. If you will be installing in a domain, you need either a pre-assigned
computer name for which a domain account has been created, or the right to
create a computer account within the domain.
After a few seconds you will receive the Networking Settings window. BTW, if you have
a NIC that is not in the HCL (see the What's the HCL? page) and W2K cannot detect it,
or if you don't have a NIC at all, setup will skip this step and you will immediately go to
the final phase of the setup process.
Press Next to accept the Typical settings option if you have one of the following
situations:
COMPUTER NETWORK PROJECT FILE IT-366
Otherwise select Custom Settings and press Next to customize your network settings.
In the General tab enter the required information. You must specify the IP address of
the computer, and if you don't know what the Subnet Mask entry should be - you can
simply place your mouse pointer over the empty area in the Subnet Mask box and click
it. The OS will automatically select the value it thinks is good for the IP address you
provided.
Lamer note: In the above screenshot I've configured the computer with a valid IP
address for MY network, along with the Default Gateway and the address of MY DNS
server. Your settings may differ.
If you don't know what these values mean, or if you don't know what to write in them,
press cancel and select the Typical Settings option. You can easily change these values
later.
If you're a stand-alone computer, or if you don't know what to enter, or if you don't have
the sufficient rights to join a domain - leave the default entry selected and press Next.
If you want to join a domain (NT 4.0 domain of W2K/2003 Active Directory domain)
enter the domain's name in the "Yes, make this computer a member of the following
domain" box.
The person performing the installation must have a user account in Active
Directory. This account does not need to be the domain Administrator account.
and
The computer must have an existing computer account in the Active Directory
database of the domain that the computer is joining, and the computer must be
named exactly as its domain account is named.
or
Also, you need to have connectivity to the domain's domain controllers (only to the PDC
if on an NT 4.0 domain) and a fully functional DNS server (only in AD domains). Read
the Joining a Domain in Windows XP Pro and Requirements when Joining a Domain
pages for more on this issue.
COMPUTER NETWORK PROJECT FILE IT-366
Enter the Active Directory domain name (in the form of xxx.yyy, for example:
DPETRI.NET) or the NetBIOS name of the NT 4.0 domain (in the form of xxx, for
example: DPETRI). Press Next.
Note: If you provide a wrong domain name or do not have the correct connectivity to the
domain's DNS server you will get an error message.
A username/password window will appear. Enter the name and password of the
domain's administrator (or your own if you're the administrator on the target domain).
Note: Providing a wrong username or password will cause this phase to fail.
9. Next the setup process will finish copying files and configuring the setup. You do
not need to do anything.
10. After the copying and configuring phase is finished, if Windows Server 2003 finds
that you have a badly configured screen resolution it will advise you to change it
and ask you if you see the new settings right.
11. Setup finishes and displays the finish window. Unfortunately, you must press
Finish in order to reboot..
COMPUTER NETWORK PROJECT FILE IT-366
12. Windows 2000 reboots and you should get the CTRL-ALT-DEL window.
PRACTICAL NO. 9
A virtual private network (VPN) is a computer network in which some of the links
between nodes are carried by open connections or virtual circuits in some larger
networks, such as the Internet, as opposed to running across a single private network.
The Link Layer protocols of the virtual network are said to be tunneled through the
transport network. One common application is to secure communications through the
public Internet, but a VPN does not need to have explicit security features such as
authentication or content encryption. For example, VPNs can also be used to separate
the traffic of different user communities over an underlying network with strong security
features, or to provide access to a network via a customized or private routing
mechanisms.
VPN service providers may offer best-effort performance, or may have a defined service
level agreement (SLA) with their VPN customers. Generally, a VPN has a topology
more complex than point-to-point.
The Internet Engineering Task Force (IETF) has categorized a variety of VPNs, some of
which, such as Virtual LANs (VLAN) are the standardization responsibility of other
organizations, such as the Institute of Electrical and Electronics Engineers (IEEE)
Project 802, Workgroup 802.1 (architecture). Originally, Wide Area Network (WAN) links
from a telecommunications service provider interconnected network nodes within a
single enterprise. With the advent of LANs, enterprises could interconnect their nodes
with links that they owned. While the original WANs used dedicated lines and layer 2
multiplexed services such as Frame Relay, IP-based layer 3 networks, such as the
ARPANET, Internet, military IP networks (NIPRNET, SIPRNET, JWICS, etc.), became
common interconnection media. VPNs began to be defined over IP networks [1]. The
military networks may themselves be implemented as VPNs on common transmission
equipment, but with separate encryption and perhaps routers.
COMPUTER NETWORK PROJECT FILE IT-366
Mobile VPNs are VPNs for mobile and wireless users. They apply standards-based
authentication and encryption technologies to secure communications with mobile
devices and to protect networks from unauthorized users. Designed for wireless
environments, Mobile VPNs provide an access solution for mobile users who require
secure access to information and applications over a variety of wired and wireless
networks. Mobile VPNs allow users to roam seamlessly across IP-based networks and
in and out of wireless-coverage areas without losing application sessions or dropping
the secure VPN session. For instance, highway patrol officers require access to
mission-critical applications as they travel between different subnets of a mobile
network, much as a cellular radio has to hand off its link to repeaters at different cell
towers.
The Host Identity Protocol (HIP), under study by the Internet Engineering Task Force, is
designed to support mobility of hosts by separating the role of IP addresses for host
identification from their locator functionality in an IP network. With HIP a mobile host
maintains its logical connections established via the host identity identifier while
associating with different IP addresses when roaming between access networks.
Remote access for Electronic, Inc. employees is deployed by using remote access VPN
connections across the Internet based on the settings configured in Common
configuration for the VPN server and the following additional settings.
The following illustration shows the Electronic, Inc. VPN server that provides remote
access VPN connections.
COMPUTER NETWORK PROJECT FILE IT-366
o Domain configuration
The remote access permission on the dial-in properties of the user account is set
to Control access through Remote Access Policy.
The user account is added to the VPN_Users Active Directory group.
To define the authentication and encryption settings for remote access VPN
clients, the following remote access policy is created:
The remote access computer logs on to the Electronic, Inc. domain using a
LAN connection to the Electronic, Inc. intranet and receives a certificate
COMPUTER NETWORK PROJECT FILE IT-366