Understanding Remote Access
One of the primary purposes for having a network is the ability to connect systems. As networks have grown, many technologies have come on the scene to make this process easier and more secure. A key area of concern relates to the connection of systems and other networks that aren’t part of your network. The following sections discuss the more common protocols used to facilitate connectivity among remote systems.
Any authentication done for a remote user is known as remote authentication. This authentication is commonly done using TACACS or RADIUS (which are discussed in Chapter 5).
Using Point-to-Point Protocol