1st Edition

Complete Book of Remote Access
Connectivity and Security




  • This format is currently out of stock.
ISBN 9780849312533
Published December 10, 2002 by Auerbach Publications
392 Pages 56 B/W Illustrations

USD $180.00

Prices & shipping based on shipping country


Preview

Book Description

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how to make remote access secure.

The definitive resource for network administrators and IT professionals implementing and maintaining remote access systems, The Complete Book of Remote Access: Connectivity and Security provides the technical background needed to confidently select and implement the best remote access technologies for your company's network. It provides basic technical information on remote access network technologies and the functional information on the role that remote access networks play in moving information.

In-depth coverage shows you how to assess remote access needs and identify appropriate solutions for different platforms. The author includes discussions of remote access configuration, security considerations from strong authentication to VPN, troubleshooting, maintenance, and disaster recovery. With coverage on the enabling technologies and how to make remote access secure, The Complete Book of Remote Access is truly the definitive resource for network administrators and IT professionals looking to achieve seamless connectivity and stable remote access to servers and networks.

Table of Contents

INTRODUCTION TO REMOTE ACCESS
Fundamentals of Remote Access
Overview
Benefits of Remote Access
Employee Benefits
Managers and Employers Benefits
Summary

Designing a Remote Access Solution
Defining Requirements
Connectivity Options
Remote Access Methods
Remote Control
Remote Node
Remote Control over Remote Access
Integrated Solution
Internet-Based Remote Access
Protecting Transmitted Data
Protecting Network Resources
Administration Systems
Server Features
Remote Access Policy
Summary

Remote Access Functions
Two Approaches: Remote Node vs. Remote Control
Remote Access Servers

ExtraNets: Borderless Internet/Intranet Networking
Benefits of Borderless Networks
Analyzing Solutions
Major Network Vendor Provides Borderless Solution
The Challenge of the Extranet

Implementing and Supporting Extranets
Extranet Architectures
Summary

Providing Access to External Databases
Defining Data Needs
Selecting External Sources
Information Access Methods
Update Frequency
Database Access Cost
Economizing on Multiple Access Requirements
LAN Access to a Modem Pool
Summary

Remote LAN Access Technology
Remote Access Methods
Remote Node Access
Applications
Field Force Automation
Security Options
Summary

TECHNOLOGY

Communication Servers
Who's Clamoring for Connections?
The Methods of Connecting
Remote Control
Remote Node
Combining Connections
Creating and Enforcing Remote-Access Communication Policies
Administration Costs Can Be Staggering
Adherence to Remote-Access Communication Policy
Summary

Virtual Private Networking
The Benefits of Virtual Private Networking
What are the Implementations of VPNs?
Risk Versus Reward on the Cutting Edge
Pitfalls During Deployment
Part of a Bigger Security Picture
Summary

Overview of Traditional Carrier Virtual Private Networks
The Carrier Based VPN Concept
Making the Business Case for VPNs
Billing Options
Network Management
Access Arrangements
Data Networking over the VPN
Conclusion

VPN Design Approaches
Use of the Internet as a Virtual Network
The Market for VPN

Wireless Technology
Wireless Communications
Wireless Office Services (WOS)
Cellular Digital Packet Data
Wireless Local Area Networks
802.11 Standard
Wireless Internet Access
Wireless Broadband Internet Access
Uses for Wireless Technology
Searching for a Wireless Solution
Summary

Wireless Application Protocol (WAP)
WAP: Technology for M-Commerce
Arguments for WAP
Arguments against WAP

Choosing a Remote Access Strategy
The Remote PC
The Destination
Connection Technologies
Conclusion

SECURITY

An Introduction to Secure Remote Access
Security Goals for Remote Access
Reliable Authentication of Remote Users/Hosts
Remote Access Mechanisms
Virtual Private Networks
Selecting a Remote Access System
Remote Access Policy

Centralized Authentication Services
AAA 101: Key Features of an AAA Service
RADIUS: Remote Authentication Dial-In User Service
TACACS: Terminal Access Controller Access Control System
DIAMETER: Twice RADIUS?

Remote Access Authentication
User and Client Authentication
Defining the Security Process
Making Enterprise-Specific Security Choices
Defining Remote Access: Establishing a Common Vocabulary
Six Components That Secure Remote Access
Conclusion

Security Risks in Telecommuting
Telecommuting in Today's Distributed Enterprise
Who/What Poses Security Risks
Types of Security Risks in Telecommuting
Minimizing Security Risks
Conclusion

Secure External Network Communications
External Connectivity Requirements
The Network Security Architecture
Summary
Who and What Poses Security Risks
Types of Security Risks in Telecommuting
Minimizing Security Risks
Conclusion

Dial-Up Security Controls
Types of Dial-Up Access
Minimizing Risks
Identification
Passwords
A Brief Authentication Requirements Review
The Final Defense
Summary
Top 10 Dial-In Security Mistakes
Top Ten
Top Ten Explained
Summary
Virtual Private Networks Security
Why VPN Security?
Understanding IBM VPN Security
Enterprise Partner/Supplier Network
Branch Office Connection Network
Remote Access Network
Understanding Microsoft VPN Security
Front-End Processors
Advanced VPN Security Features
Summary
VPNs: Secure Remote Access over the Internet
VPN Common Uses
Easy to Manage and Use
Summary

Wireless Internet Security
Who's Using the Wireless Internet?
What Types of Applications Are Available?
How Secure Are the Transmission Methods?
FDMA
TDMA
GSM
CDMA
How Secure Are The Wireless Devices?
How Secure Are the Network Infrastructure Components?
Summary

MANAGEMENT

Telecommuting: Issues for the IS Manager
Societal Benefits of Telecommuting
Why Employees Want to Telecommute
The Benefits of Autonomy
Organizational Benefits of Telecommuting
Preparing the Organization for a Telecommuting Program
Jobs Suitable for Telecommuting
Technology Requirements
Future Needs
Implementing a Telecommuting Program
Telecenters
Managing Telecommuters
Suggestions for Successful Implementation

Evaluating Organizational Readiness for Telecommuting
Benefits of Telecommuting for the Worker
Benefits of Telecommuting for the Company
Drawbacks of Telecommuting
Telecommuting Organizations

Supporting Telework
Obstacles of Virtual Work Arrangements
Removing Obstacles with Technology
Removing Obstacles with Managerial Actions
Conclusion

Assuming Command of Your Network
The Cost of Management
Managing for the Future
The Human Element
Telecommuter Skill Set
Telecommuter Training
Manager Skill Set
Manager Training
Office Technology for the Telecommuter
Settling on a Network Strategy
Functional Requirements
Applications
Summary

...
View More