Index
V
Vadasz, Les, 318
/validate, 93
vectors, attack, 629–630
VeriSigncertificates, 152
overview of, 356
as reputable CA, 154
Victim computer, 16–17
virtual interface, 421
virtual local area network (VLAN), 312
Virtual Private Networks (VPNs)NT 4.0 and, 34
connections costs, 652
connectivity design overview, 423–425
connectivity overview, 446
DNS and, 451
extranet infrastructure design, 443
IAS and, 665
L2TP in, 433–438
PPTP in, 425–433
protocols overview, 425
Remote Access Policies and, 439–442
remote access with, 445
routing design between internal networks, 442
securing, overview of, 410
security vs. dial-up, 447
Server 2003 features, 438–439
tunnels, 446
virusesclients and, 630, 672
Network Access Quarantine Control and, 670
overview of, 18–19
risk analysis and, 510–511
VLAN (virtual local area network), 312
volume shadow copy, 595