Complete Book of Remote Access : Connectivity and Security book cover
1st Edition

Complete Book of Remote Access
Connectivity and Security

Edited By

Victor Kasacavage

  • This format is currently out of stock.
ISBN 9780849312533
Published December 10, 2002 by Auerbach Publications
392 Pages 56 B/W Illustrations

USD $170.00

Prices & shipping based on shipping country


Book Description

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how to make remote access secure.

The definitive resource for network administrators and IT professionals implementing and maintaining remote access systems, The Complete Book of Remote Access: Connectivity and Security provides the technical background needed to confidently select and implement the best remote access technologies for your company's network. It provides basic technical information on remote access network technologies and the functional information on the role that remote access networks play in moving information.

In-depth coverage shows you how to assess remote access needs and identify appropriate solutions for different platforms. The author includes discussions of remote access configuration, security considerations from strong authentication to VPN, troubleshooting, maintenance, and disaster recovery. With coverage on the enabling technologies and how to make remote access secure, The Complete Book of Remote Access is truly the definitive resource for network administrators and IT professionals looking to achieve seamless connectivity and stable remote access to servers and networks.

Table of Contents

Fundamentals of Remote Access
Benefits of Remote Access
Employee Benefits
Managers and Employers Benefits

Designing a Remote Access Solution
Defining Requirements
Connectivity Options
Remote Access Methods
Remote Control
Remote Node
Remote Control over Remote Access
Integrated Solution
Internet-Based Remote Access
Protecting Transmitted Data
Protecting Network Resources
Administration Systems
Server Features
Remote Access Policy

Remote Access Functions
Two Approaches: Remote Node vs. Remote Control
Remote Access Servers

ExtraNets: Borderless Internet/Intranet Networking
Benefits of Borderless Networks
Analyzing Solutions
Major Network Vendor Provides Borderless Solution
The Challenge of the Extranet

Implementing and Supporting Extranets
Extranet Architectures

Providing Access to External Databases
Defining Data Needs
Selecting External Sources
Information Access Methods
Update Frequency
Database Access Cost
Economizing on Multiple Access Requirements
LAN Access to a Modem Pool

Remote LAN Access Technology
Remote Access Methods
Remote Node Access
Field Force Automation
Security Options


Communication Servers
Who's Clamoring for Connections?
The Methods of Connecting
Remote Control
Remote Node
Combining Connections
Creating and Enforcing Remote-Access Communication Policies
Administration Costs Can Be Staggering
Adherence to Remote-Access Communication Policy

Virtual Private Networking
The Benefits of Virtual Private Networking
What are the Implementations of VPNs?
Risk Versus Reward on the Cutting Edge
Pitfalls During Deployment
Part of a Bigger Security Picture

Overview of Traditional Carrier Virtual Private Networks
The Carrier Based VPN Concept
Making the Business Case for VPNs
Billing Options
Network Management
Access Arrangements
Data Networking over the VPN

VPN Design Approaches
Use of the Internet as a Virtual Network
The Market for VPN

Wireless Technology
Wireless Communications
Wireless Office Services (WOS)
Cellular Digital Packet Data
Wireless Local Area Networks
802.11 Standard
Wireless Internet Access
Wireless Broadband Internet Access
Uses for Wireless Technology
Searching for a Wireless Solution

Wireless Application Protocol (WAP)
WAP: Technology for M-Commerce
Arguments for WAP
Arguments against WAP

Choosing a Remote Access Strategy
The Remote PC
The Destination
Connection Technologies


An Introduction to Secure Remote Access
Security Goals for Remote Access
Reliable Authentication of Remote Users/Hosts
Remote Access Mechanisms
Virtual Private Networks
Selecting a Remote Access System
Remote Access Policy

Centralized Authentication Services
AAA 101: Key Features of an AAA Service
RADIUS: Remote Authentication Dial-In User Service
TACACS: Terminal Access Controller Access Control System

Remote Access Authentication
User and Client Authentication
Defining the Security Process
Making Enterprise-Specific Security Choices
Defining Remote Access: Establishing a Common Vocabulary
Six Components That Secure Remote Access

Security Risks in Telecommuting
Telecommuting in Today's Distributed Enterprise
Who/What Poses Security Risks
Types of Security Risks in Telecommuting
Minimizing Security Risks

Secure External Network Communications
External Connectivity Requirements
The Network Security Architecture
Who and What Poses Security Risks
Types of Security Risks in Telecommuting
Minimizing Security Risks

Dial-Up Security Controls
Types of Dial-Up Access
Minimizing Risks
A Brief Authentication Requirements Review
The Final Defense
Top 10 Dial-In Security Mistakes
Top Ten
Top Ten Explained
Virtual Private Networks Security
Why VPN Security?
Understanding IBM VPN Security
Enterprise Partner/Supplier Network
Branch Office Connection Network
Remote Access Network
Understanding Microsoft VPN Security
Front-End Processors
Advanced VPN Security Features
VPNs: Secure Remote Access over the Internet
VPN Common Uses
Easy to Manage and Use

Wireless Internet Security
Who's Using the Wireless Internet?
What Types of Applications Are Available?
How Secure Are the Transmission Methods?
How Secure Are The Wireless Devices?
How Secure Are the Network Infrastructure Components?


Telecommuting: Issues for the IS Manager
Societal Benefits of Telecommuting
Why Employees Want to Telecommute
The Benefits of Autonomy
Organizational Benefits of Telecommuting
Preparing the Organization for a Telecommuting Program
Jobs Suitable for Telecommuting
Technology Requirements
Future Needs
Implementing a Telecommuting Program
Managing Telecommuters
Suggestions for Successful Implementation

Evaluating Organizational Readiness for Telecommuting
Benefits of Telecommuting for the Worker
Benefits of Telecommuting for the Company
Drawbacks of Telecommuting
Telecommuting Organizations

Supporting Telework
Obstacles of Virtual Work Arrangements
Removing Obstacles with Technology
Removing Obstacles with Managerial Actions

Assuming Command of Your Network
The Cost of Management
Managing for the Future
The Human Element
Telecommuter Skill Set
Telecommuter Training
Manager Skill Set
Manager Training
Office Technology for the Telecommuter
Settling on a Network Strategy
Functional Requirements

View More