13.4. Summary

In this chapter, you learned about the two most basic security concerns: security filtering and user authentication. First, we talked about how to allow remote computers to join your network and how to specify the way traffic leaves your network using access control lists. Then, you learned about various tunneling and encryption protocols like SSL, VPN, L2TP, PPTP, and IPSEC.

Moving on, we examined several of the ways used today to remotely access networks, including RAS, RDP, PPP, PPPoE, VNC, and ICA.

We wrapped things up by discussing solid user-account and password-management policies and why those policies are essential to maintaining tight security on your network. Finally, you learned about authentication methods like PKI, ...

Get CompTIA Network+® Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.