This preview shows page 1. Sign up to view the full content.
Unformatted text preview: rface.
Multihomed firewall must have at least
two interfaces to filter traffic (they’re also
known as dual-homed firewalls). Lecture-3 56 Firewall Deployment
Architectures Lecture-3 57 Remote Access Security
Management Remote connectivity technology: Each type of
connection has its own unique security issues. Fully examine every aspect of your connection
options. This can include modems, DSL, ISDN,
wireless networking, and cable modems. Transmission protection: There are several forms
of encrypted protocols, encrypted connection Systems, and encrypted network services or
applications. Use the appropriate combination of
secured services for your remote connectivity needs.
This can include VPNs, SSL, TLS, Secure Shell
(SSH), IPSec, and L2TP.
Lecture-3 58 Remote Access Security
Management Authentication protection: In addition to protecting
data traffic, you must also ensure that all Logon credentials are properly secured. Requires the use of an authentication Include Password Authentication Protocol (PAP),
Challenge Handshake Authentication Protocol
(CHAP), Extensible Authentication Protocol (EAP),
Remote Authentication Dial-In User Service (RADIUS),
and Terminal Access Controller Access Control
System (TACACS). Lecture-3 59...
View Full Document
This note was uploaded on 01/21/2014 for the course IT 205 taught by Professor Kurts during the Winter '08 term at University of Phoenix.
- Winter '08