Lecture-3 ISO Model, Network Security, and Protocols

Lecture 3 55 firewalls cont multihomed firewalls some

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: rface. Multihomed firewall must have at least two interfaces to filter traffic (they’re also known as dual-homed firewalls). Lecture-3 56 Firewall Deployment Architectures Lecture-3 57 Remote Access Security Management Remote connectivity technology: Each type of connection has its own unique security issues. Fully examine every aspect of your connection options. This can include modems, DSL, ISDN, wireless networking, and cable modems. Transmission protection: There are several forms of encrypted protocols, encrypted connection Systems, and encrypted network services or applications. Use the appropriate combination of secured services for your remote connectivity needs. This can include VPNs, SSL, TLS, Secure Shell (SSH), IPSec, and L2TP. Lecture-3 58 Remote Access Security Management Authentication protection: In addition to protecting data traffic, you must also ensure that all Logon credentials are properly secured. Requires the use of an authentication Include Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), Extensible Authentication Protocol (EAP), Remote Authentication Dial-In User Service (RADIUS), and Terminal Access Controller Access Control System (TACACS). Lecture-3 59...
View Full Document

This note was uploaded on 01/21/2014 for the course IT 205 taught by Professor Kurts during the Winter '08 term at University of Phoenix.

Ask a homework question - tutors are online