5.2 Explain the methods of network access security.

5.2 Explain the methods of network access security.
 * ACL :
 * MAC filtering
 * IP filtering
 * Port filtering
 * Tunneling and encryption :
 * SSL VPN
 * VPN
 * L2TP
 * PPTP
 * IPSec
 * ISAKMP
 * TLS
 * TLS1.2
 * Site-to-site and client-to-site
 * Remote access:
 * RAS
 * RDP
 * PPPoE
 * PPP
 * ICA
 * SSH