Summary Securing remote access to networks is a broad subject. First, the use of tools such as RRAS and IAS must be considered, and their role as remote access portals must be explained. Next, and equally important, is the security of these devices. Improper configuration of these services can negate any security that they provide. New uses for these servers, such as using Network Access Quarantine Control to place security requirements on clients that connect to the remote access servers and the implementation of VPNS and 802.1x authentication to protect network access via wireless networks, are also critical to the protection of network. Finally, to complete an understanding of remote access, consider barriers to network access that result from the use of and connection to the internal network by web servers and the applications that run on them. |