Chapter 12. The Remote-User Design
Terms you'll need to understand:
Software access option
Remote site firewall option
Hardware VPN client option
Remote site broadband router option
CRL
Techniques you'll need to master:
Performing threat analysis against VPN services
Evaluating remote-user connectivity needs
Chapter 10, “The Small Network Implementation,” and Chapter 11, “The Medium Network Implementation,” dealt with fixed locations, where everything is (nominally, at least) under the control of the IT organization, even if that is outsourced. When we look at securing remote users, however, we face a different kind of problem: Sometimes although the principal information asset is the organization's property, it is not under the organization's actual control. ...
Get CSI Exam Cram™ 2 (Exam 642-541) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.