In Chapter 3, you took a look at integrating iOS-based devices with your wireless network and some tasks you might perform when those devices are on your network. In this chapter, you’re going to look at strategies for remotely accessing your network and then learn how to accomplish such a lofty goal while maintaining a maximum level of security.


Shared Secret Remote Access Virtual Private Network Server Admin Mobile Access 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© by Charles Edge 2010

Authors and Affiliations

  • Charles Edge

There are no affiliations available

Personalised recommendations