Скачать в pdf «Network+»

■    RAS

■    PPP

■    PPTP

■    ICA

X 2.13 Identify the following security protocols and describe their purpose and function:

■    IPSec

■    L2TP

■    SSL

■    Kerberos

■/ 3.7 Given a remote connectivity scenario (e.g., IP, IPX, dial-up, PPPoE, authentication, physical connectivity, etc.), configure the connection.

4.3 Given a troubleshooting scenario involving a remote connectivity problem (e.g., authentication failure, protocol configuration, physical connectivity), identify the cause of the problem.

emote access technologies allow users to access your network and its services from a computer outside the network. For example, users can check e-mail and keep in touch with the office while on the road. The need for remote access has increased during the last few years, because many employees now work out of their homes and telecommute instead of working at a desk in a cubicle. Today, many employees travel with laptops, and many hotels and motels are equipped with second phone lines or Internet connections.

Before employees can telecommute, however, both their equipment and the corporate network must be set up for remote access. This involves acquiring the appropriate hardware, installing the appropriate software, configuring this hardware and software, and ensuring that the proper protocols are in place. In this chapter, we’ll look at these requirements from the standpoint of what you, as a network administrator, will need to know in the workplace and for the Network+ exam.

Remote Access Connection Configuration Requirements

^^emote access requires two basic components: a remote computer (typically a laptop) and a remote access system on the network (typically a computer or device running special software called the Remote Access Server). The remote computer connects to the remote access server and then operates just as it would if it were a workstation on the network.

Скачать в pdf «Network+»