StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

RADIUS Implementation - Essay Example

Cite this document
Summary
Harrington states that RADIUS not only offers security for business data and other sensitive information in a business environment, but also offers a more comprehensive communication system for user authentication purposes and fosters a secure server/client computer system. The…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
RADIUS Implementation
Read Text Preview

Extract of sample "RADIUS Implementation"

RADIUS Implementation al Affiliation) Question One Harrington s that RADIUS not only offers security for business data and other sensitive information in a business environment, but also offers a more comprehensive communication system for user authentication purposes and fosters a secure server/client computer system. The most vital benefits of RADIUS as mentioned above is offering detailed security. This is achieved by enabling the information relating to the user to be stored in a singular host, especially in large business environments where security data and information is not located in one device, but in multiple devices, a situation that increases risk of intrusion.

By using RADIUS, every access and authentication to a company’s network applications are controlled by the RADIUS server, which serves as a functioning host (Harrington, 2005).As a systems administrator, one of my major duties is ensuring that the company’s network system is running smoothly and that any technical glitches are fixed immediately to prevent further delays in the execeution of tasks that may cause the company to lose money. Therefore the vast logging capabilities of RADIUS will be very beneficial in ensuring that I am able to ensure that the optimal conditions of the network system are maintained, courtesy of RADIUS’ capacity to map out an audit trail of the network system.

This will enable me to analyze logging files for billing and security purposes.There is growing need for improved security measures in order to restrict intrusion and restricted entry to a company’s network environment. This has led to the development of new viruses and other malicious programs and software aimed at disrupting company functions, thus requiring a system that can adapt to these changes. RADIUS offers a long lasting solution to the evolving network environment by adopting a server that utilizes modifiable stubs.

Simply, the RADIUS server adapts itself to an individual network and can expand to provide other security services.Question TwoAccording to Cache et al., the Network Policy Server found in Windows Server 2012 possesses some features that are compatible with RADIUS, especially in relation to the company’s network environment. One of the characteristics includes its ability to ensure the migration of NPS configuration settings for RADIUS servers and clients. The configuration settings capacity also extends to shared secrets which can be migrated the Network Policy Server (Cache, 2007).

Morimoto argues that the basic reasons for implementing RADIUS is in order for supporting authorization and authentication in the company’s network environment. Therefore, the NPS’ capacity to support authentication setting methodology in RADIUS is an added advantage. In addition, NPS facilitates SQL accounting by configuring accounting, connection description, maximum session settings and authentication (Morimoto, 2012).Question ThreeAs the systems administrator, I would consider using RADIUS templates primarily due to the cost and time saving benefits accrued when configuring the Network Policy Server (NPS) to multiple servers in the organization.

Furthermore, when a RADIUS template is configured correctly, the functionality of the NPS server is altered to facilitate communication between access servers on the organization’s network and consequently promotes system flexibility.Question FourIf there were no other restrictions or variables, I would not consider using password based techniques for authentication due to their weak security capabilities. Authentication measures based on passwords don’t offer strong security for network systems.

However, I would consider adopting certificate based authentication methods especially in relation to wireless connections used in the organization. Additionally, the choice of authentication method would not be hard to choose since the decision would be informed by the network access server configuration, network policy and the organization’s computer network running NPS.Reference ListCache, J., & Liu, V. (2007). Hacking exposed wireless: Wireless security secrets & solutions. New York, NY: McGraw-Hill.

Harrington, J. (2005). Network security a practical approach. Amsterdam: Elsevier.Morimoto, R. (2012). Windows Server 2012 unleashed. Indianapolis, IN: Sams.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“RADIUS Implementation Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
RADIUS Implementation Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1695100-radius-implementation
(RADIUS Implementation Essay Example | Topics and Well Written Essays - 500 Words)
RADIUS Implementation Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1695100-radius-implementation.
“RADIUS Implementation Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1695100-radius-implementation.
  • Cited: 0 times

CHECK THESE SAMPLES OF RADIUS Implementation

Solid Mechanics Issues

hellip; A fillet was added to the sections indicated using the fillet feature with a uniform radius of 3 mm.... The design was produced using SolidWorks 2010.... The larger cylinder was created as an extruded boss with the initially provided dimensions.... After this the smaller cylinder was created using an extruded boss with the provided dimensions....
5 Pages (1250 words) Lab Report

Mediterranean fruit fly (ceratitis capitat) in NewZealand

Specific background information related to the med fly is considered.... The implications for its invasion in New Zealand are explored.... Biological characteristics unique to its invasion are… The steps the country took following the invasion are also examined.... Finally, a critique of these steps is established....
5 Pages (1250 words) Essay

The Nature Of Acastus Declaration

As a consequences of the anti-immigration law enforced by Acastus, its neighbouring country radius also adopted similar statute relating... The declaration made by Acastus stated that the renewal of leaves to remain in Acastus for migrant workers shall be possible after the migrant workers have received a certificate of integration which will be further delivered by the authorities of the county where he or she… Furthermore, it was made mandatory that the certificate shall be delivered only after the migrant workers have performed 1000 hours of unpaid community service that contributes to the economic development of Acastus....
11 Pages (2750 words) Essay

UNIT 4 seminar

Process evaluation comprises of assessment activities integrated into the implementation of the program.... It assesses the implementation of a given program (Royse, Thyer, & Padgett, 2010).... On the other hand, outcome evaluation is carried out after the conclusion of the implementation program in a bid to determine whether the program really works....
1 Pages (250 words) Research Paper

Site to Site Internet Protocol Security

It is developed by the Internet Engineering Task Force (IETF) and has been deployed widely in the implementation of Virtual Private Networks (VPN).... The implementation of IPSec can take place at the end host or in the routers or even in both depending on the security requirements of the users (Doraswamy & Harkins 2003)....
6 Pages (1500 words) Essay

Implementation of a leadership development program

This vast population will have an impact on the technique chosen, its success, and costs of implementation.... The vast composition of the Baltimore Insurance organization is an elemental aspect, which, constitute the issue in the course of establishing the technique to employ and implementation of the program.... Even with the present advances in technology, traditional training approaches remain key and remarkably effective in approaching implementation of new programs....
5 Pages (1250 words) Essay

Fiber Optic Technology

This coursework "Fiber Optic Technology" describes key aspects of fiber optics.... This paper outlines the implications for telecommunication companies, advantages and disadvantages of fiber optic technologies, the fiber optics trend, and benefits for business and society.... nbsp;… Whether by their pledge to enhance business and societies, emerging technologies such as nanotechnology, cloud computing, social media, and fiber optics among other technologies, are in the frontline of shaping today's society and business for a brighter tomorrow....
10 Pages (2500 words) Coursework

Network Time Protocol

This paper outlines the history of NTP, vulnerabilities, reduction of vulnerability and mitigation, Intrusion Prevention System (IPS), the security of NTP implementation.... In the year 1988, the implementation of NTPv0 took place in both UNIX and Fuzzball (Mills, 2003)....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us