Chapter Summary

This chapter focuses on the protocols and procedures involved in establishing and configuring network connectivity. Each of the major operating systems has to be correctly configured before remote users can log on to a network. Although the information needed to access these networks is the same, the methods for configuring the information is different across operating system platforms.

Configuring remote access involves a number of different software configurations. To access a remote network, a user must have a valid protocol, a means of accessing the remote network (such as a dial-up account), and a valid user account. Accessing a remote network requires considerable configuration on both the client and server computer systems. ...

Get Network+ Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.