Network Security Fundamentals [Electronic resources]

Gert De Laet, Gert Schauwers

نسخه متنی -صفحه : 196/ 93
نمايش فراداده

Chapter 11. Remote Access

On completing this chapter, you will be able to

  • Explain the AAA model

  • Describe various AAA servers

  • Explain how the lock-and-key feature works

  • Describe two-factor identification

This chapter describes how to configure, test, and use remote access techniques. The overall goal of remote access is to grant trusted access for telecommuters, salespeople, and road warriors to the corporate network over an untrusted network such as the Internet. The concluding case study is a practical example of how organizations can provide access to their networks in a secure manner, thereby enabling a worldwide workforce to use remote access technology.