Remote access, as the term applies, means that a remote user is trying to access the resources of an organization by creating an encrypted packet stream. The term might appropriately apply to the software running on a user's machine, which is trying to create the tunnel to the organization, and to a device on the network allowing the connection. This tunnel could be coming in from the Internet, but it also could be coming in from a dedicated, dial-up, or ISDN line.
Figure 21-7 illustrates a typical remote access VPN implementation.
Was this article helpful?