In an older blog post on Certificate Authorities, I have provided some information about the process to generate Exchange 2007 certificates. This process has slightly changed in Exchange 2010, and Johan Delimon (pro-exchange.be) has written an excellent article Read more
The following procedure explains how to set up a Juniper ScreenOS based firewall to accept Netscreen Remote Client VPN connections and authenticate users using Active Directory (Radius via Windows 2003 IAS or Windows 2008 NPS).
We’ll assume that all Read more
Before looking at the various configuration steps, we’ll have to take the following assumptions into account :
– We don’t want to use the Netscreen Remote client, but we want to use the Windows XP built-in dialup VPN technology Read more
On popular request, this is a quick write-up on how to set up a Juniper screenOS firewall to use an external Radius server (I’ll use Windows IAS) to authenticate administrators and to let the Radius server to assign admin Read more
I wanted to share a small utility that I wrote a while ago, allowing you to run a non-interactive ‘ping’ to a tcp port (e.g. from within a script).
This could for example allow you to bring up a Read more
Keywords : ldap authentication multiple domains combine adam adamsync adschemaanalyzer ldap proxy chain ldifde MS-ADAMSyncconf.xml MS-AdamSyncMetadata.ldf MS-ADAMSchemaW2K3.ldf Object Violation Naming Violation Ldap error occured. ldap_add_sW: Object Class Violation.
According to Microsoft, Windows Server 2008 is the most secure Windows server version ever.
Windows 2008 does include many features that will help increase overall security of the OS, or assist you with securing AD, the network, etc. Most Read more
Every admin knows by now that using Active Directory as the central authentication database allows for a lot of possibilities in terms of user account and security management. Keeping internal as well as external users in one and the Read more
As most of the bigger players in the firewall market, Juniper/Netscreen SreenOS based firewalls allow you to use/enforce/require authentication for various reasons :
In a default Read more