O'Reilly logo

CompTIA® Security+™: Study Guide, Fifth Edition by Emmett Dulaney

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding Remote Access

One of the primary purposes for having a network is the ability to connect systems. As networks have grown, many technologies have come on the scene to make this process easier and more secure. A key area of concern relates to the connection of systems and other networks that aren’t part of your network. The following sections discuss the more common protocols used to facilitate connectivity among remote systems.

note.eps

Any authentication done for a remote user is known as remote authentication. This authentication is commonly done using TACACS or RADIUS (which are discussed in Chapter 5).

Using Point-to-Point Protocol

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required