Appendix eH

Configuring Wireless Security Remote Access

John R. Vacca
This Appendix describes how to configure wireless remote access servers and make sure that they are secured effectively and are configured to enforce wireless security policies.

1. Ensuring That Remote Wireless Access Servers Are Secured Effectively

Remote access servers provide a way for external hosts to gain access to internal resources, so their security is particularly important. In addition to permitting unauthorized access to resources, a compromised server could be used to eavesdrop on remote access communications and manipulate them, as well as provide a jumping-off point for attacking other hosts within the organization. It is particularly important for organizations to ...

Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.