Information Technology Reference
In-Depth Information
26.
Ready to Build the Service Profile: Click the Next button to build the profile. The profile
will typically be saved to c:\program files\cmak\profiles\ <ProfileName> \
<ProfileFileName> .exe .
27.
Distribute the profile to users so that they can connect to the remote access server.
How It Works
Use of the Connection Manager Administration Kit has two key advantages for the system
administrator:
￿
Reduced number of help desk calls: By creating a CMAK profile, you have specified all
the information that the end user should need to connect to your remote access server.
The user only needs to install the package and provide logon credentials. Without a
CMAK profile, you will undoubtedly have to spend significant time creating documenta-
tion and working with end users over the phone because they are uncertain how to
properly configure their workstations for remote access.
￿
Enhanced security: You specify the level of security and other key settings in the CMAK
profile. Users will not have the ability to relax the security settings and compromise the
security policies that you have put into place.
As previously described, there are many settings that can be configured in the profile. You
will probably use a small number of these (such as VPN-related settings) the majority of the
time, and many others (such as logo bitmaps) only on rare occasions.
If you plan to distribute phone books with your CMAK profile, you should also install
Connection Point Services from the Add/Remove Programs
Add/Remove Windows Compo-
nents wizard to enable their distribution.
See Also
￿
Microsoft TechNet: “Connection Manager Administration Kit” series of articles
( http://technet2.microsoft.com/WindowsServer/f/?en/Library/
be5c1c37-109e-49bc-943e-6595832d57611033.mspx ). These articles provide
a complete description of the service as well as its configuration and use.
￿
Microsoft TechNet: “Connection Point Services” series of articles
( http://technet2.microsoft.com/WindowsServer/f/?en/Library/
abbc6145-06ed-428c-8fb6-44a3f22033411033.mspx ). These articles provide
a complete description of the service as well as its configuration and use.
4-15. Configuring Site-to-Site VPNs
Problem
You want to connect two sites through a virtual private network.
Search WWH ::




Custom Search