Chapter Summary

Remote access has become an important part of modern business, and companies have come to depend on the ability to access network applications and services from a remote location. To facilitate remote access, all the major operating systems offer the protocols necessary to connect a remote client to a server system. Some of the most common remote access protocols are SLIP, PPP, PPTP, RAS, L2TP, and ICA.

Implementing remote access for an organization introduces another issue for the network administrator: security. You must understand and use security protocols to ensure that data is not compromised. The common security protocols include IPSec, SSL, and Kerberos.

KEY TERMS

  • RAS

  • SLIP

  • PPP

  • CHAP

  • MS-CHAP

  • PAP

  • EAP

  • SPAP

  • PPTP

  • ICA

  • security protocol

  • encryption

  • IPSec

  • L2F

  • L2TP

  • SSL

  • Kerberos

  • SSH

  • RADIUS

  • VPN


..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset