Complete Book of Remote Access: Connectivity and Security, 1st Edition (Hardback) book cover

Complete Book of Remote Access

Connectivity and Security, 1st Edition

Edited by Victor Kasacavage

Auerbach Publications

392 pages | 56 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9780849312533
pub: 2002-12-10
SAVE ~$34.00
Currently out of stock
$170.00
$136.00
x
eBook (VitalSource) : 9780429132742
pub: 2002-12-10
from $28.98


FREE Standard Shipping!

Description

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how to make remote access secure.

The definitive resource for network administrators and IT professionals implementing and maintaining remote access systems, The Complete Book of Remote Access: Connectivity and Security provides the technical background needed to confidently select and implement the best remote access technologies for your company's network. It provides basic technical information on remote access network technologies and the functional information on the role that remote access networks play in moving information.

In-depth coverage shows you how to assess remote access needs and identify appropriate solutions for different platforms. The author includes discussions of remote access configuration, security considerations from strong authentication to VPN, troubleshooting, maintenance, and disaster recovery. With coverage on the enabling technologies and how to make remote access secure, The Complete Book of Remote Access is truly the definitive resource for network administrators and IT professionals looking to achieve seamless connectivity and stable remote access to servers and networks.

Table of Contents

INTRODUCTION TO REMOTE ACCESS

Fundamentals of Remote Access

Overview

Benefits of Remote Access

Employee Benefits

Managers and Employers Benefits

Summary

Designing a Remote Access Solution

Defining Requirements

Connectivity Options

Remote Access Methods

Remote Control

Remote Node

Remote Control over Remote Access

Integrated Solution

Internet-Based Remote Access

Protecting Transmitted Data

Protecting Network Resources

Administration Systems

Server Features

Remote Access Policy

Summary

Remote Access Functions

Two Approaches: Remote Node vs. Remote Control

Remote Access Servers

ExtraNets: Borderless Internet/Intranet Networking

Benefits of Borderless Networks

Analyzing Solutions

Major Network Vendor Provides Borderless Solution

The Challenge of the Extranet

Implementing and Supporting Extranets

Extranet Architectures

Summary

Providing Access to External Databases

Defining Data Needs

Selecting External Sources

Information Access Methods

Update Frequency

Database Access Cost

Economizing on Multiple Access Requirements

LAN Access to a Modem Pool

Summary

Remote LAN Access Technology

Remote Access Methods

Remote Node Access

Applications

Field Force Automation

Security Options

Summary

TECHNOLOGY

Communication Servers

Who's Clamoring for Connections?

The Methods of Connecting

Remote Control

Remote Node

Combining Connections

Creating and Enforcing Remote-Access Communication Policies

Administration Costs Can Be Staggering

Adherence to Remote-Access Communication Policy

Summary

Virtual Private Networking

The Benefits of Virtual Private Networking

What are the Implementations of VPNs?

Risk Versus Reward on the Cutting Edge

Pitfalls During Deployment

Part of a Bigger Security Picture

Summary

Overview of Traditional Carrier Virtual Private Networks

The Carrier Based VPN Concept

Making the Business Case for VPNs

Billing Options

Network Management

Access Arrangements

Data Networking over the VPN

Conclusion

VPN Design Approaches

Use of the Internet as a Virtual Network

The Market for VPN

Wireless Technology

Wireless Communications

Wireless Office Services (WOS)

Cellular Digital Packet Data

Wireless Local Area Networks

802.11 Standard

Wireless Internet Access

Wireless Broadband Internet Access

Uses for Wireless Technology

Searching for a Wireless Solution

Summary

Wireless Application Protocol (WAP)

WAP: Technology for M-Commerce

Arguments for WAP

Arguments against WAP

Choosing a Remote Access Strategy

The Remote PC

The Destination

Connection Technologies

Conclusion

SECURITY

An Introduction to Secure Remote Access

Security Goals for Remote Access

Reliable Authentication of Remote Users/Hosts

Remote Access Mechanisms

Virtual Private Networks

Selecting a Remote Access System

Remote Access Policy

Centralized Authentication Services

AAA 101: Key Features of an AAA Service

RADIUS: Remote Authentication Dial-In User Service

TACACS: Terminal Access Controller Access Control System

DIAMETER: Twice RADIUS?

Remote Access Authentication

User and Client Authentication

Defining the Security Process

Making Enterprise-Specific Security Choices

Defining Remote Access: Establishing a Common Vocabulary

Six Components That Secure Remote Access

Conclusion

Security Risks in Telecommuting

Telecommuting in Today's Distributed Enterprise

Who/What Poses Security Risks

Types of Security Risks in Telecommuting

Minimizing Security Risks

Conclusion

Secure External Network Communications

External Connectivity Requirements

The Network Security Architecture

Summary

Who and What Poses Security Risks

Types of Security Risks in Telecommuting

Minimizing Security Risks

Conclusion

Dial-Up Security Controls

Types of Dial-Up Access

Minimizing Risks

Identification

Passwords

A Brief Authentication Requirements Review

The Final Defense

Summary

Top 10 Dial-In Security Mistakes

Top Ten

Top Ten Explained

Summary

Virtual Private Networks Security

Why VPN Security?

Understanding IBM VPN Security

Enterprise Partner/Supplier Network

Branch Office Connection Network

Remote Access Network

Understanding Microsoft VPN Security

Front-End Processors

Advanced VPN Security Features

Summary

VPNs: Secure Remote Access over the Internet

VPN Common Uses

Easy to Manage and Use

Summary

Wireless Internet Security

Who's Using the Wireless Internet?

What Types of Applications Are Available?

How Secure Are the Transmission Methods?

FDMA

TDMA

GSM

CDMA

How Secure Are The Wireless Devices?

How Secure Are the Network Infrastructure Components?

Summary

MANAGEMENT

Telecommuting: Issues for the IS Manager

Societal Benefits of Telecommuting

Why Employees Want to Telecommute

The Benefits of Autonomy

Organizational Benefits of Telecommuting

Preparing the Organization for a Telecommuting Program

Jobs Suitable for Telecommuting

Technology Requirements

Future Needs

Implementing a Telecommuting Program

Telecenters

Managing Telecommuters

Suggestions for Successful Implementation

Evaluating Organizational Readiness for Telecommuting

Benefits of Telecommuting for the Worker

Benefits of Telecommuting for the Company

Drawbacks of Telecommuting

Telecommuting Organizations

Supporting Telework

Obstacles of Virtual Work Arrangements

Removing Obstacles with Technology

Removing Obstacles with Managerial Actions

Conclusion

Assuming Command of Your Network

The Cost of Management

Managing for the Future

The Human Element

Telecommuter Skill Set

Telecommuter Training

Manager Skill Set

Manager Training

Office Technology for the Telecommuter

Settling on a Network Strategy

Functional Requirements

Applications

Summary

About the Series

Best Practices

Learn more…

Subject Categories

BISAC Subject Codes/Headings:
COM043000
COMPUTERS / Networking / General
COM053000
COMPUTERS / Security / General