Preview

Labs for Your Health

Satisfactory Essays
Open Document
Open Document
263 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Labs for Your Health
Lab 17 - Configuring Mobile Connectivity

Exercise 17.2|Configuring a VPN Connection|
Overview|In Exercise 17.2, you examine the parameters you can use to configure the VPN connection you created in Exercise 17.1. Because the VPN server will at first have only a limited number of connections, you must prevent users from remaining connected when they are not actually using the network.|
Completion time|5 minutes|

Question 1|How many connections are there in the Network Connections window?|

3. Take a screen shot of the VPN Server Connection Properties sheet by pressing Alt+Prt Scr, and then paste the resulting image into the Lab17_worksheet file in the page provided by pressing Ctrl+V.

Exercise 17.3|Connecting to a VPN Server|
Overview|In Exercise 17.3, you practice establishing a connection to the VPN server.|
Completion time|20 minutes|

6. Take a screen shot of the Network and Sharing Center control panel, showing the VPN connection, by pressing Alt+Prt Scr, and then paste the resulting image into the Lab17_worksheet file in the page provided by pressing Ctrl+V.

Question 2|Which of the VPN protocols is the connection using?|
Question 3|Which authentication protocol is the VPN connection using?|

Table 17-3
Connection results for VPN protocols
Type of VPN|Result message|
Point-to-Point Tunneling Protocol

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT220 Lab 7

    • 303 Words
    • 2 Pages

    LAN to LAN tunnels, MPLS network and VPN site to site I would chose the MPLS network its more reliable.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1330lab8worksheet

    • 1017 Words
    • 6 Pages

    8. Press Ctrl+Prt Scr to take a screen shot of the Group Policy Management Editor showing that the Remove Properties from the Computer icon text menu is enabled, and then press Ctrl+V to paste the resulting image into the lab08_worksheet file in the page provided.…

    • 1017 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    10 Take a screen shot of the Windows Easy Transfer Reports window by pressing Alt+Prt Scr and then paste it into your Lab02_worksheet file in the page provided by pressing Ctrl+V.…

    • 695 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Munasinghe, K. S. and Shahrestani, S.A.,“Analysis of Multiple Virtual Private Network Tunnels over Wireless LANs,” in Proceedings of the 3rdInternational Business Information Management Conference (IBIMA 2004), pp. 206-211, December 2004b.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Good Essays

    The Remote Access will provide the Virtual Private Networks with services that the users can use to access the corporate networks over the Internet as it they were directly connected. This remote access will enable the remote…

    • 623 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    Click the Security tab and then take a screen shot of the VPN Server Connection Properties sheet by pressing Alt+Prt Scr. Then paste the resulting image into the Lab 18 worksheet file in the page provided by pressing Ctrl+V.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It-260 Worksheet

    • 512 Words
    • 3 Pages

    Press Ctrl+Prt Scr to take a screen shot of the Installation Results page in the Resume Configuration Wizard. Press Ctrl+V to paste the image on the page provided in the lab01_worksheet file.…

    • 512 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 15

    • 866 Words
    • 4 Pages

    11.Take a screen shot of the Review your backup settings page by pressing Alt+Prt Scr, and then paste the resulting image into the Lab15_worksheet file in the page provided by pressing Ctrl+V.…

    • 866 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    Requires a slightly more complicated VPN router configuration. Because the CA server can not be reached on the public Internet, enrolling a new branch requires a VPN administrator to certificate enroll the VPN routers in one of the following ways:…

    • 943 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    VPN – virtual private network – it provides the functionality of a privately owned secure network without the associate costs of leased telephone lines, satellites, and other communication equipment.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    You can also add the VPN settings to your connection that provides another encryption layer to your network as if anyone remain able to join the network needs hard time to gain access to…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 2 Lab Manual

    • 1433 Words
    • 6 Pages

    1. Explain the difference between a network device and a peripheral device and give examples of each. You can use your textbook and the Internet to research your answer.…

    • 1433 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Take a screen shot of the message box by pressing Alt+Prt Scr and paste it into your Lab03_worksheet file in the page provided by pressing Ctrl+V.…

    • 298 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven.…

    • 791 Words
    • 4 Pages
    Good Essays