Remote-Access Control

Probably one of the weakest points in any network is remote access. Most security incidents occur over remote-access connections (whether a dial-up line or the Internet). The remote-access problem is further aggravated by the fact that you can’t disable it because it is needed and that its very nature should permit access from virtually anywhere. Therefore, the only solution to the remote-access issue is the use of strong encryption and authentication. Different circumstances warrant different solutions, ranging from IP Security Architecture (IPsec) for network-level security to Secure Shell (SSH) for application-level security. In no case should clear-text protocols such as telnet or rlogin be used for remote access over ...

Get Solaris 8 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.