A wide variety of protocols and options exist for remote access including SSH, Telnet, RADIUS, TACACS+, PTPP, L2TP, and others.
Understand the role of security with respect to remote access and the primary methods to support secure remote access.
RADIUS and TACAS+ are both authentication, authorization, and accounting (AAA) protocols used for remote access administration.
Wireless Access
Wireless protocols and the security implications in their use for remote access create a challenge for security.
WEP provides for a specific level of security in order to offer relatively safe remote connections.
Flaws in WEP leave it vulnerable to specific technical attacks.
VPN/IPsec
Virtual private networks (VPN) and Internet Protocol Security (IPSec) offer methods for ensuring confidentiality and integrity during remote connections.
Tunneling is a means of encapsulating packets inside a protocol that is understood only at the entry and exit points of the tunnel to provide a secure network connection across a public section of a TCP/IP network.
PTPP is a tunneling protocol, popular with Microsoft Windows, that implements tunnels in software.
IPSec is the most comprehensive architecture of VPN implementation.
To learn more about the book this website supports, please visit its Information Center.