Professional Documents
Culture Documents
Short for virtual private network, a network that is constructed by using public wires
to connect nodes. For example, there are a number of systems that enable you to
create networks using the Internet as the medium for transporting data. These
systems use encryption and other security mechanisms to ensure that only
authorized users can access the network and that the data cannot be
intercepted.
A virtual private network (VPN) is a network that uses a public
telecommunication infrastructure, such as the Internet, to provide remote
offices or individual users with secure access to their organization's
network. A virtual private network can be contrasted with an expensive system of
owned or leased lines that can only be used by one organization. The goal of a VPN
is to provide the organization with the same capabilities, but at a much lower cost.
A VPN works by using the shared public infrastructure while maintaining privacy
through security procedures and tunneling protocols such as the Layer Two
Tunneling Protocol (L2TP). In effect, the protocols, by encrypting data at the
sending end and decrypting it at the receiving end, send the data through a
"tunnel" that cannot be "entered" by data that is not properly encrypted. An
additional level of security involves encrypting not only the data, but also the
originating and receiving network addresses
IPv6
Support for Internet Protocol version 6 (IPv6), a new suite of standard protocols for
the Network layer of the Internet, is built into the latest versions of Microsoft
Windows, which include Windows Vista, Windows Server 2008, Windows Server
2003, Windows XP with Service Pack 2, Windows XP with Service Pack 1, Windows
XP Embedded SP1, and Windows CE .NET.
IPv6 is designed to solve many of the problems of the current version of IP (known
as IPv4) such as address depletion, security, autoconfiguration, and extensibility. Its
use will also expand the capabilities of the Internet to enable a variety of valuable
and exciting scenarios, including peer-to-peer and mobile applications.
Network Access Protection
The Next Generation TCP/IP Stack in Windows Vista and Windows Server 2008 is a
complete redesign of TCP/IP functionality for both Internet Protocol version 4 (IPv4)
and Internet Protocol version 6 (IPv6) that meets the connectivity and performance
needs of today's varied networking environments and technologies.
Quality of Service
Routing and Remote Access is a network service in Microsoft Windows Server 2008
(now in beta testing), Windows Server 2003, and Windows 2000 Server that
provides the following services:
Scalable Networking
Networking - Routing
Demand-Dial Routing
Microsoft® Windows® 2000 provides extensive support for demand-dial routing, the
routing of packets over point-to-point links such as analog phone lines and ISDN.
Demand-dial routing allows you to connect to the Internet, to connect branch offices,
or to implement router-to-router virtual private network (VPN) connections.
Windows Firewall
Windows Firewall drops incoming traffic that does not correspond to either traffic
sent in response to a request of the computer (solicited traffic) or unsolicited traffic
that has been specified as allowed (excepted traffic). Windows Firewall provides
a level of protection from malicious users and programs that rely on
unsolicited incoming traffic to attack computers.
PPTP
Short for Point-to-Point Tunneling Protocol, a new technology for creating VPNs, developed
jointly by Microsoft, U.S. Robotics and several remote access vendor companies, known
collectively as the PPTP Forum. A VPN is a private network of computers that uses the
public Internet to connect some nodes. Because the Internet is essentially an open
network, PPTP is used to ensure that messages transmitted from one VPN node to another
are secure. With PPTP, users can dial in to their corporate network via the Internet.
L2TP
Short for Layer Two (2) Tunneling Protocol, an extension to the PPP protocol that enables ISPs
to operate Virtual Private Networks (VPNs). L2TP merges the best features of two other tunneling
protocols: PPTP from Microsoft and L2F from Cisco Systems. Like PPTP, L2TP requires that the
ISP's routers support the protocol.
Proxy Server
A server that sits between a client application, such as a Web browser, and a real server.
It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it
forwards the request to the real server.
ISA Server
Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to
Microsoft's Proxy Server 2.0 (see proxy server) and is part of Microsoft's .NET
support. ISA Server provides the two basic services of an enterprise firewall and a
Web proxy/cache server. ISA Server's firewall screens all packet-level, circuit-
level, and application-level traffic. The Web cache stores and serves all regularly
accessed Web content in order to reduce network traffic and provide faster
access to frequently-accessed Web pages. ISA Server also schedules downloads of
Web page updates for non-peak times.
ISA Server allows administrators to create policies for regulating usage based on
user, group, application, destination, schedule, and content type criteria. ISA
Server is designed to work with Windows 2000 and later operating systems and to
take advantage of Windows' Kerberos security. ISA Server includes a software
development kit (SDK).
ISA Server comes in two editions, Standard Edition and Enterprise Edition. Standard
Edition is a stand-alone server that supports up to four processors. Enterprise Edition is
for large-scale deployments, server array support, multi-level policy, and computers with
more than four processors. Licenses are based on the number of processor
IP Sec
IPsec (IP security) is a suite of protocols for securing Internet Protocol (IP)
communications by authenticating and/or encrypting each IP packet in a data stream.
IPsec also includes protocols for cryptographic key establishment.
Managing Accepted Domains
An accepted domain is any Simple Mail Transfer Protocol (SMTP) namespace for
which a Microsoft Exchange organization sends or receives e-mail. Accepted domains
include those domains for which the Exchange organization is authoritative. An
Exchange organization is authoritative when it handles mail delivery for recipients in
the accepted domain. Accepted domains also include domains for which the
Exchange organization receives mail and then relays it to an e-mail server that is
outside the Active Directory directory service forest for delivery to the recipient.
What is Citrix?
Citrix MetaFrame Presentation Server is a technology that can allow remote users to
connect to applications that are actually installed on a remote computer. It uses a
mix of technology that results in that remote application looking and behaving just
as though it was installed on the local machine.
WinFrame
is that network users on non-Windows machines (e.g., Macintoshes, DOS systems, and
UNIX machines) can run Windows A technology developed by Citrix Systems that turns
Windows NT into a multi-user operating system. Together with another Citrix technology
called ICA, WinFrame enables a Windows NT server to function like a minicomputer.
The result applications. The actual applications are executed on the WinFrame
Application Server; the client machines are just terminals, used only for entering user
input and displaying application output.
The ICA protocol is responsible for sending input and output between the client machines
and the WinFrame server. Conceptually, the protocol is similar to X-Window, which
serves the same purpose for UNIX systems.