On completing this chapter, you will be able to
Explain the AAA model
Describe various AAA servers
Explain how the lock-and-key feature works
Describe two-factor identification
This chapter describes how to configure, test, and use remote access techniques. The overall goal of remote access is to grant trusted access for telecommuters, salespeople, and road warriors to the corporate network over an untrusted network such as the Internet. The concluding case study is a practical example of how organizations can provide access to their networks in a secure manner, thereby enabling a worldwide workforce to use remote access technology.