Chapter Review
Many methods can be used to achieve security under remote access conditions, and the number is growing as new protocols are developed to meet the ever-increasing use of remote access. From the beginnings of Telnet, to IPv6 with built-in IPsec, the options are many, but the task is basically the same. Perform the functions of authentication, authorization, and accounting while providing message and data security from outside intervention.
Table 9-1 shows some remote access support solutions.
Some of the remote access solutions have a hardware component (such as L2F and RADIUS), some have software (SSH and PPTP), and some have both (VPN and IPsec), depending on the vendor’s implementation and system requirements. Your choice of a ...
Get CompTIA Security+ All-in-One Exam Guide (Exam SY0-301), 3rd Edition, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.