NIH Enterprise Architecture Home

Remote Access/Wireless Boundary
Services Pattern

Description

The remote access boundary applies to all forms of remote access including Internet or business partner VPN, dial in remote access, and wireless. By definition, the remote access boundary pattern assumes that an untrusted network (i.e. a network that is not owned or managed by NIH or is not via NIH managed VPN and encryption) is being traversed for by a trusted client (i.e. a client that implements NIH managed or specified security services) to trusted server communications. Even wireless local area networks are considered remote access since the medium that is traversed between the client and the wireless network access point is considered untrusted, as it is inherently vulnerable to remote monitoring and traffic that is designed to penetrate or attack NIH resources.

Diagram

Remote Access/Wireless Boundary Services Pattern

Benefits

None documented.

Limitations

None documented.

Time Table

This architecture definition approved on: July 18, 2003

The next review is scheduled in: TBD