Learn how to remotely access a Solaris system
Review methods for securing remote access
Discover the benefits of Kerberos authentication
In this chapter, we examine the most commonly used methods to remotely access Solaris systems with a focus on setting up Internet access.