Remote Access Troubleshooting
n
Your first approach to a remote access problem
should include considerations for (cont.):
n
Correct authentication credentials
n
Similar encryption or security requirements
n
Proper protocol requirements and settings