dial-up over a modem, ISDN services, and of course VPN connections.
Remote access these days typically means VPN connections, some type of remote desktop connections, or even remote shells.
Two critical elements in remote access are encryption and authentication.
All of these connection methods require encryption and authentication.
most common types of protocols
IPsec for security,
Layer 2 Tunneling Protocol (L2TP) tunneling and encapsulation protocol.
Another common type of VPN connection uses secure sockets layer (SSL).
ensure that remote access connections are authenticated as well as encrypted.
The VPN client and the concentrator side must support the same levels of encryption and authentication, which should be configured in advance; otherwise, a secure connection can’t be established.
For remote shell connections, ensure that you’re using only secure protocols, such as SSH, for example.
Telnet, rexec, and rsh (remote shell), are non-secure
SSH, provides for secure authentication and encryption
can use public and private key technologies to generate key pairs and certificates for local and remote hosts.
SSH can be used for secure file copy
using SCP
and secure file transfer for multiple hosts (with SFTP).
Remote desktop technologies provide varying degrees of security,
non-secure remote desktop protocols can be tunneled through other secure protocols, such as IPsec, SSL, or SSH.