Description
The remote access boundary applies to all forms of remote access including Internet or business partner VPN, dial in remote access, and wireless. By definition, the remote access boundary pattern assumes that an untrusted network (i.e. a network that is not owned or managed by NIH or is not via NIH managed VPN and encryption) is being traversed for by a trusted client (i.e. a client that implements NIH managed or specified security services) to trusted server communications. Even wireless local area networks are considered remote access since the medium that is traversed between the client and the wireless network access point is considered untrusted, as it is inherently vulnerable to remote monitoring and traffic that is designed to penetrate or attack NIH resources.
Diagram
Benefits
None documented.
Limitations
None documented.
Time Table
This architecture definition approved on:
July 18, 2003
The next review is scheduled in:
TBD