Site MapHelpFeedbackChapter Summary
Chapter Summary
(See related pages)

Remote Access Protocols

  • A wide variety of protocols and options exist for remote access including SSH, Telnet, RADIUS, TACACS+, PTPP, L2TP, and others.


  • Understand the role of security with respect to remote access and the primary methods to support secure remote access.


  • RADIUS and TACAS+ are both authentication, authorization, and accounting (AAA) protocols used for remote access administration.


Wireless Access

  • Wireless protocols and the security implications in their use for remote access create a challenge for security.


  • WEP provides for a specific level of security in order to offer relatively safe remote connections.


  • Flaws in WEP leave it vulnerable to specific technical attacks.


VPN/IPsec

  • Virtual private networks (VPN) and Internet Protocol Security (IPSec) offer methods for ensuring confidentiality and integrity during remote connections.


  • Tunneling is a means of encapsulating packets inside a protocol that is understood only at the entry and exit points of the tunnel to provide a secure network connection across a public section of a TCP/IP network.


  • PTPP is a tunneling protocol, popular with Microsoft Windows, that implements tunnels in software.


  • IPSec is the most comprehensive architecture of VPN implementation.









Security+ and BeyondOnline Learning Center

Home > Chapter 11 > Chapter Summary