The basic feature of RAS is to allow remote users to gain access to the network resources. RAS server authenticates remote users and based on the credentials supplied provides them with the access to network resources. If using NT systems, RAS comes as a service which can be installed and configured to use NT domain authentication to provide remote users with access to domain resources. For higher level of authentication levels RAS can be configured to use RADIUS/ACE Server/Digital Cert Authentications.
The basic configuration of a RAS consists of :
-Authentication Method & source(user data source)
-Single or Multiple domain Access
-Dial in & Dial out configuration
-Auditing (user Tracking)& Time out for idle connections.
Dig deeper on Network Security Monitoring and Analysis
Related Q&A from Puneet Mehta
To view network security expert Puneet Mehta's latest advice, see his Public Profile on the IT Knowledge Exchange: http://...continue reading
Find out if there's a difference between a virtual private network (VPN) concentrator and a network access server (NAS) in this explanation from our ...continue reading
Our network security expert explains how to keep unauthorized users from accessing your router's IP address for Internet access in this advice ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.