Skip to main content
  • 1440 Accesses

9. Summary and Conclusions

With the proliferation of broadband access worldwide, remote access is becoming more prevalent in increasingly mission critical applications for the competitive enterprise. Cable modems and xDSL access are making remote office/telecommuting an increasingly viable and useful scenario for individual subscribers. Similarly, the dramatic increase in the availability of public wireless LANs (802.11) is enabling mobile workers to stay connected to the enterprise network at broadband speeds. Securing these client sessions and protecting intellectual property is clearly a key enterprise requirement, and IPSec defines the architecture for this security. However, equipment costs, scaling issues, and administrative overhead have made deployment and ongoing management of remote access by the enterprise problematic. This enterprise pain point presents service providers with an opportunity — to offer a managed secure remote access service.

Service providers can now use IPSec secure remote access services as a foundation for a value-added services portfolio. Finally, these providers can now offer IPSec secure remote access to customers who desire this critical service, but do not want to provide the equipment and stafing requirements themselves.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

10. References

  1. “Secure Remote Access,” Copyright © 2004, Juniper Networks, Inc. All rights reserved. Juniper Networks, Inc., 1194 North Mathilda Avenue, Sunnyvale, CA 94089, 2004.

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

(2006). Configuring Secure Access. In: Guide to Wireless Network Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-29845-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-29845-0_17

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-95425-7

  • Online ISBN: 978-0-387-29845-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics