March 2019
Intermediate to advanced
234 pages
8h 14m
English
Accessing resources in a secure way is important, and this must be performed securely. It's not always possible to perform this using a Site-2-Site connection, especially when we have to perform something out of work hours. In this case, we can use Point-2-Site to create a secure connection that can be established from anywhere.