Solved

Whas the difference between a Remote Access Policy and a Connection Request policy in IAS?

Posted on 2009-07-09
3
1,243 Views
Last Modified: 2012-05-07
Hi Everyone,
I am in the process of setting up RADIUS Authentication for my wireless network and was wondering if someone could please clarify the differences between a Remote Access Policy and a Connection Request Policy?

I have configured a remote access policy to allow users in the Domain Users group and I am just using the default Connection Request Policy but for some reason none of my users are being authenticated against the Remote Access Policy. Is there anything that I need to configure in the Connection request policy to allow this to happen?

Any assistance in helping me sort out these issues would be most appreciated.
0
Comment
Question by:SteveJ-007
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 11

Accepted Solution

by:
Abhay Pujari earned 500 total points
ID: 24820530
0
 
LVL 11

Expert Comment

by:Abhay Pujari
ID: 24820534
Sorry it should be IAS and not ISA
0
 

Author Closing Comment

by:SteveJ-007
ID: 31601936
Great Thanks For the help
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question