1st Edition

Complete Book of Remote Access Connectivity and Security

Edited By Victor Kasacavage Copyright 2002
    392 Pages 56 B/W Illustrations
    by Auerbach Publications

    As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how to make remote access secure.

    The definitive resource for network administrators and IT professionals implementing and maintaining remote access systems, The Complete Book of Remote Access: Connectivity and Security provides the technical background needed to confidently select and implement the best remote access technologies for your company's network. It provides basic technical information on remote access network technologies and the functional information on the role that remote access networks play in moving information.

    In-depth coverage shows you how to assess remote access needs and identify appropriate solutions for different platforms. The author includes discussions of remote access configuration, security considerations from strong authentication to VPN, troubleshooting, maintenance, and disaster recovery. With coverage on the enabling technologies and how to make remote access secure, The Complete Book of Remote Access is truly the definitive resource for network administrators and IT professionals looking to achieve seamless connectivity and stable remote access to servers and networks.

    INTRODUCTION TO REMOTE ACCESS
    Fundamentals of Remote Access
    Overview
    Benefits of Remote Access
    Employee Benefits
    Managers and Employers Benefits
    Summary

    Designing a Remote Access Solution
    Defining Requirements
    Connectivity Options
    Remote Access Methods
    Remote Control
    Remote Node
    Remote Control over Remote Access
    Integrated Solution
    Internet-Based Remote Access
    Protecting Transmitted Data
    Protecting Network Resources
    Administration Systems
    Server Features
    Remote Access Policy
    Summary

    Remote Access Functions
    Two Approaches: Remote Node vs. Remote Control
    Remote Access Servers

    ExtraNets: Borderless Internet/Intranet Networking
    Benefits of Borderless Networks
    Analyzing Solutions
    Major Network Vendor Provides Borderless Solution
    The Challenge of the Extranet

    Implementing and Supporting Extranets
    Extranet Architectures
    Summary

    Providing Access to External Databases
    Defining Data Needs
    Selecting External Sources
    Information Access Methods
    Update Frequency
    Database Access Cost
    Economizing on Multiple Access Requirements
    LAN Access to a Modem Pool
    Summary

    Remote LAN Access Technology
    Remote Access Methods
    Remote Node Access
    Applications
    Field Force Automation
    Security Options
    Summary

    TECHNOLOGY

    Communication Servers
    Who's Clamoring for Connections?
    The Methods of Connecting
    Remote Control
    Remote Node
    Combining Connections
    Creating and Enforcing Remote-Access Communication Policies
    Administration Costs Can Be Staggering
    Adherence to Remote-Access Communication Policy
    Summary

    Virtual Private Networking
    The Benefits of Virtual Private Networking
    What are the Implementations of VPNs?
    Risk Versus Reward on the Cutting Edge
    Pitfalls During Deployment
    Part of a Bigger Security Picture
    Summary

    Overview of Traditional Carrier Virtual Private Networks
    The Carrier Based VPN Concept
    Making the Business Case for VPNs
    Billing Options
    Network Management
    Access Arrangements
    Data Networking over the VPN
    Conclusion

    VPN Design Approaches
    Use of the Internet as a Virtual Network
    The Market for VPN

    Wireless Technology
    Wireless Communications
    Wireless Office Services (WOS)
    Cellular Digital Packet Data
    Wireless Local Area Networks
    802.11 Standard
    Wireless Internet Access
    Wireless Broadband Internet Access
    Uses for Wireless Technology
    Searching for a Wireless Solution
    Summary

    Wireless Application Protocol (WAP)
    WAP: Technology for M-Commerce
    Arguments for WAP
    Arguments against WAP

    Choosing a Remote Access Strategy
    The Remote PC
    The Destination
    Connection Technologies
    Conclusion

    SECURITY

    An Introduction to Secure Remote Access
    Security Goals for Remote Access
    Reliable Authentication of Remote Users/Hosts
    Remote Access Mechanisms
    Virtual Private Networks
    Selecting a Remote Access System
    Remote Access Policy

    Centralized Authentication Services
    AAA 101: Key Features of an AAA Service
    RADIUS: Remote Authentication Dial-In User Service
    TACACS: Terminal Access Controller Access Control System
    DIAMETER: Twice RADIUS?

    Remote Access Authentication
    User and Client Authentication
    Defining the Security Process
    Making Enterprise-Specific Security Choices
    Defining Remote Access: Establishing a Common Vocabulary
    Six Components That Secure Remote Access
    Conclusion

    Security Risks in Telecommuting
    Telecommuting in Today's Distributed Enterprise
    Who/What Poses Security Risks
    Types of Security Risks in Telecommuting
    Minimizing Security Risks
    Conclusion

    Secure External Network Communications
    External Connectivity Requirements
    The Network Security Architecture
    Summary
    Who and What Poses Security Risks
    Types of Security Risks in Telecommuting
    Minimizing Security Risks
    Conclusion

    Dial-Up Security Controls
    Types of Dial-Up Access
    Minimizing Risks
    Identification
    Passwords
    A Brief Authentication Requirements Review
    The Final Defense
    Summary
    Top 10 Dial-In Security Mistakes
    Top Ten
    Top Ten Explained
    Summary
    Virtual Private Networks Security
    Why VPN Security?
    Understanding IBM VPN Security
    Enterprise Partner/Supplier Network
    Branch Office Connection Network
    Remote Access Network
    Understanding Microsoft VPN Security
    Front-End Processors
    Advanced VPN Security Features
    Summary
    VPNs: Secure Remote Access over the Internet
    VPN Common Uses
    Easy to Manage and Use
    Summary

    Wireless Internet Security
    Who's Using the Wireless Internet?
    What Types of Applications Are Available?
    How Secure Are the Transmission Methods?
    FDMA
    TDMA
    GSM
    CDMA
    How Secure Are The Wireless Devices?
    How Secure Are the Network Infrastructure Components?
    Summary

    MANAGEMENT

    Telecommuting: Issues for the IS Manager
    Societal Benefits of Telecommuting
    Why Employees Want to Telecommute
    The Benefits of Autonomy
    Organizational Benefits of Telecommuting
    Preparing the Organization for a Telecommuting Program
    Jobs Suitable for Telecommuting
    Technology Requirements
    Future Needs
    Implementing a Telecommuting Program
    Telecenters
    Managing Telecommuters
    Suggestions for Successful Implementation

    Evaluating Organizational Readiness for Telecommuting
    Benefits of Telecommuting for the Worker
    Benefits of Telecommuting for the Company
    Drawbacks of Telecommuting
    Telecommuting Organizations

    Supporting Telework
    Obstacles of Virtual Work Arrangements
    Removing Obstacles with Technology
    Removing Obstacles with Managerial Actions
    Conclusion

    Assuming Command of Your Network
    The Cost of Management
    Managing for the Future
    The Human Element
    Telecommuter Skill Set
    Telecommuter Training
    Manager Skill Set
    Manager Training
    Office Technology for the Telecommuter
    Settling on a Network Strategy
    Functional Requirements
    Applications
    Summary

    Biography

    Victor Kasacavage