Remote Access Security
In the past, remote access was seldom part of most companies’ networks. It was too hard to implement, too hard to manage, and too hard to secure. It’s reasonably easy to secure your networks from unauthorized physical access, but it was perceived to be much harder to do so for remote access. Recently, a number of security policies, protocols, and technologies have been developed to ease this problem. First we’ll discuss the user authentication protocols.
One of the first steps in establishing a secure remote access connection involves allowing the user to present some credentials to the server. You can use any or all of the following authentication protocols that Windows Server 2008 R2 supports: