Chapter 11. Remote Access

On completing this chapter, you will be able to

  • Explain the AAA model

  • Describe various AAA servers

  • Explain how the lock-and-key feature works

  • Describe two-factor identification

This chapter describes how to configure, test, and use remote access techniques. The overall goal of remote access is to grant trusted access for telecommuters, salespeople, and road warriors to the corporate network over an untrusted network such as the Internet. The concluding case study is a practical example of how organizations can provide access to their networks in a secure manner, thereby enabling a worldwide workforce to use remote access technology.

AAA Model

Authentication, authorization, and accounting (AAA, pronounced “triple A”) provides ...

Get Network Security Fundamentals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.