Enhanced Intranet Management in a DHCP-enabled Environment
|
|
|
- Paulina Cobb
- 10 years ago
- Views:
Transcription
1 Enhanced Intranet Management in a DHCP-enabled Environment Jenq-Haur Wang and Tzao-Lin Lee Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan. {jhwang, tl_lee}@csie.ntu.edu.tw Feb. 18, 2002 Keywords: intranet management, network security, wireless LAN, DHCP, MAC bridges, IP spoofing Abstract DHCP (Dynamic Host Configuration Protocol) [1, 2] is widely deployed in resource allocation and intranet management. However, DHCP mechanism is not mandatory, and DHCP server can neither force DHCP clients to release their leases, nor enforce cooperation from externally configured hosts that are DHCP-unaware. Although new DHCP options such as DHCP reconfigure extension [3] have been proposed, the basic problems inherent in DHCP mechanism cannot be solved without first strengthening its operations. In this paper, a DHCP-based infrastructure for intranet management was proposed by combining the resource allocation functions of DHCP server with the packet filtering features of MAC (Medium Access Control) bridges [4] such as Ethernet switches and wireless access points. DHCP clients that do not follow DHCP mechanism as well as DHCP-unaware hosts that do not abide by our management policy will be denied network accesses by MAC bridges. Through the cooperation of DHCP server and MAC bridges, resource allocation and access control can be integrated and local configuration conflicts can be reduced to the minimum. Introduction Network security has continued to be a major issue in all kinds of applications as Internet becomes a necessity. Various types of intrusions and attacks such as DDoS (Distributed Denial of Service) are threatening the enterprises and individuals as well. Unlike attacks from the outside, local conflicts in network configurations have direct impact on the daily operations of the intranet. DHCP (Dynamic Host Configuration Protocol) [1, 2], an extension to BOOTP protocol [5], has become more widely adopted as a mechanism for resource allocation as well as intranet management. Although it is commonly deployed, some drawbacks inherent in DHCP mechanism may cause more trouble than the benefits it can bring. First of all, DHCP server cannot force DHCP clients to release their leases. DHCP server only acts as a resource dispatcher, and normally DHCP clients will not 1
2 release their leases at shutdown, as in the case of Microsoft Windows 9x clients [6]. Although the new DHCP reconfigure extension option [3] can be used for DHCP server to force a cooperative DHCP client to renew its lease, malicious hosts may still be able to allocate new addresses without releasing them at all which would easily exhaust available IP addresses. Secondly, externally configured hosts may deliberately or accidentally use the same network addresses as DHCP clients. For such hosts, their IP addresses are manually configured and other local network parameters can be obtained via DHCPINFORM requests [1]. However, DHCPINFORM messages are not commonly implemented. If manually configured IP addresses conflict with DHCP clients without notifying DHCP server, we cannot regulate their misuse and network disaster may occur. Furthermore, the new DHCP reconfigure extension option [3] can only be used for cooperative DHCP clients, not DHCP-unaware hosts. In order to make the most of DHCP, we have to strengthen its power of regulation. There must be a mechanism to force DHCP-unaware hosts to cooperate with DHCP management policy. New options such as DHCPINFORM and DHCP reconfigure extension have to be enforced and integrated into the infrastructure to make DHCP more convenient and manageable. Once non-cooperating hosts are detected, we will alert them by DHCP FORCERENEW or RHCP (Remote Host Configuration Protocol) [7] messages. That means intranet hosts need to be extended by DHCP/RHCP processing modules to receive instructions from management server, in this case, a DHCP server. If they still don t abide by the instructions, we will restrict their network access rights at bridges. With appropriate enforcement of network access control in MAC bridges, we can compensate the disadvantages of DHCP mechanism and local conflicts can be reduced to the minimum. Motivation In our previous results [8], a mechanism for extending DHCP capabilities with MAC-layer user authentication was proposed, as shown in Fig. 1. LAN Modified DHCP server Packet Filter update KLT load Fig. 1 shows the infrastructure of DHCP-Firewall combination in our previous result [8] where KLT is the Kernel Lease Table that maintains DHCP lease information at kernel level. As shown in Fig. 1, DHCP server was coupled with firewall in order to regulate local hosts from network address misconfiguration. However, firewalls are not always deployed in all kinds of network configurations although it s better to have one. In 2 Firewall MAC-Filter Internet
3 ordinary LAN environment, bridges and routers are more widely used. In traditional Ethernet, hubs are used as a multiport repeater connecting local hosts. Traffic generated at one port will be forwarded to all other ports in a hub. However, since the nature of Ethernet is CSMA/CD (Carrier Sense Multiple Access/Collision Detection) bus, as the number of hosts in a domain grows, the chance of packet collision becomes much higher. Therefore, bridges are commonly adopted in a local area network to avoid unnecessary packet collisions among different hosts. For example, consider a small enterprise consisting of several departments in the same building. Traffic inside each department has better be contained within its own collision domain. As the number of hosts grows, the extraordinary broadcast packets may cause unnecessary traffic in a LAN. Therefore router goes one step further in containing broadcast packets in each domain. As new technology evolves, switches are getting more attention. Layer 2 switches are just bridges with more fancy features such as VLAN (virtual LAN) and full-duplexing on separate port, and layer 3 switches incorporate network layer address handling functions except routing. In such environment, we can actually combine DHCP server with layer 2/3 switches since all packets must go through these switches. Network planning had to accommodate building structure and wiring in the old days, and it s usually annoying and complicated. Thanks to the new transmission media, we may also want to deploy wireless LANs [9] as less wiring is needed in most of the offices. In such cases, wireless access points become the bridge between wired and wireless networks. DHCP-based Management: Infrastructure Actually, we can enforce access control in whatever types of MAC bridges. Our main idea is to combine the resource management function of DHCP server and the access control function of bridges. Manually configured hosts are encouraged to utilize DHCPINFORM or RHCP messages to inform DHCP server of their network address configurations. Alternatively, a simple registration step may be used for each new user or a user with a new NIC (network interface card) prior to his first Internet connection as in our previous results [8]. As shown in Fig. 2, a general infrastructure for DHCP-based management is illustrated. DHCP server MAC Bridge ACL Filtering DB LAN Internet Fig. 2 shows the basic infrastructure of DHCP-Bridge Combination. 3
4 The idea is simple: we keep track of an access control list (ACL) of hardware address and network address pairs for authorized hosts, namely (MAC, IP) pairs, and then enforce the ACL by the Filtering Database in MAC bridges [4]. Our policy is to protect those hosts that are pre-configured (externally configured hosts like servers), registered, or DHCP-aware. For all other hosts, we will not protect their packets from being filtered. All packets with unauthorized (MAC, IP) pairs will be dropped by bridges. In order to combine the resource allocation functionality of DHCP server and access control of bridges, conceptually, there will be a monitoring daemon dedicated for packet information collection and monitoring. host MAC Bridge Filtering DB R Internet host store/poll FORCERENEW/ DHCPINFORM DHCP server Lease update/ notify Daemon ACL Fig. 3 shows the interactions among DHCP server, Monitoring Daemon and MAC bridge. In Fig. 3, a common network configuration where hosts are connecting through MAC bridges to the Internet is illustrated. In this infrastructure, two components are needed: DHCP server for resource allocation and a monitoring daemon for keeping an access control list (ACL). ACL is corresponding to the Filtering Database in the MAC bridge which actually performs packet filtering and forwarding. On the one hand, monitoring daemon is responsible for receiving ACL update requests from DHCP server and registration requests from hosts. On the other hand, it is responsible for polling statistics of packets flowing through MAC bridges, and sending notifications of illegal connection attempts to DHCP server. Therefore, it is the bridge or proxy between the DHCP server and MAC bridges. DHCP-based Management: Basic Operations The basic operations of our infrastructure for DHCP-based management work as follows: (1) Data Collection Phase In the first part, we have to keep track of the hardware and network addresses of all authorized hosts, i.e. (MAC, IP) pairs, in ACL, which is done by the monitoring daemon as mentioned above. For DHCP clients, it s mandatory to make lease allocation or renewal requests to 4
5 DHCP server. It is therefore natural for DHCP server to verify and record their MAC addresses while servicing their requests as in our previous results [8]. Note that our DHCP server will check not only the Client Identifier option but also the chaddr field [1] in DHCP requests and match them with the authentic MAC address in the Ethernet header of packets. Therefore, only one legal IP address at a time can be allocated for each MAC address, hence for each Ethernet adaptor. This keeps malicious hosts from allocating new addresses without releasing them as described earlier in the introduction, even if malicious hosts are DHCP-aware. For externally configured hosts, such as intranet servers, system administrator may choose to configure their (MAC, IP) pairs manually in DHCP server. As a more dynamic and automatic alternative, hosts can also notify DHCP server of their externally configured IP address via DHCPINFORM messages if supported. This can save lots of time for manual configuration on each new host. Although DHCPINFORM is specified in RFC 2131 [1] as a required feature, not many externally configured hosts support this option. For hosts authorized by our registration server as in [8], their (MAC, IP) pairs will also be marked as legal in the process of registration. In our DHCP-based infrastructure, we can put registration server on the same host as monitoring daemon. (2) Filtering Rules Enforcement Phase After all valid (MAC, IP) pairs are collected into the ACL on monitoring daemon, the corresponding filtering rules can then be enforced into the Filtering Database of MAC bridges, such as switches or wireless access points. For ordinary layer 2 switches, there are usually several ways to configure them, for example, through the web interface, Telnet, SNMP (Simple Network Management Protocol) [10], or via a console port dedicated for management purposes, as in the case of 3Com SuperStack II Switch 3300XM [11]. We can access the Filtering Database by means of any one of the above. In the case of wireless bridges, access points are often hardware-based, which means that we may have difficulty in configuring them dynamically according to our needs. Therefore, in our solution, a software AP is incorporated into the infrastructure. On the software AP, we can build the Filtering Database for regulating the traffic across it. When monitoring daemon receives changes in ACL, the software AP will be notified and its filtering rules will be updated accordingly. DHCP-based Management: Client-Server Interactions As illustrated in Fig. 4, there are four possible cases of client-server interactions in our infrastructure. First of all, when DHCP client C 1 obtains its lease through normal DHCP procedures as shown in Fig. 4(a), DHCP server S will inform 5
6 monitoring daemon D of a valid pair (MAC C1, IP C1 ). The monitoring daemon will then pass the updated part of ACL to bridge B. Packets from C 1 can then pass through the bridge. New lease allocation DHCP client C 1 DHCP server S Daemon D Bridge B Lease renewal DHCPDISCOVER DHCPOFFER DHCPREQUEST DHCPACK DHCPREQUEST DHCPACK VALID (MAC C1, IP C1 ) T 1 VALID (MAC C1, IP C1 ) Fig. 4(a) shows the first case of client-server interactions where DHCP client C 1 allocates and renews its lease automatically in normal cases. Secondly, after time duration T 1 DHCP server S finds out that the lease of DHCP client C 1 will soon expire. If C 1 renews its lease automatically, things will go in its normal way. However, as illustrated in Fig. 4(b), if C 1 doesn t renew its lease, DHCP server will send a FORCERENEW message [3] to force C 1 into RENEW state. Then C 1 will try to send DHCPREQUEST message to renew its existing lease as in normal cases. If for some period of time τ 1 (a configurable parameter) C 1 still doesn t renew its lease, DHCP server will inform the monitoring daemon of an invalid pair (MAC C1, IP C1 ) and packets from C 1 will be prohibited from passing through bridge B. If C 1 renews its lease at a later time, DHCP server S either allocates a new lease or renews the old one, and informs the monitoring daemon of such changes. DHCP client C 1 DHCP server S Daemon D Bridge B Lease renewal DHCPREQUEST DHCPACK T 1 VALID (MAC C1, IP C1 ) Forced lease renewal FORCERENEW DHCPREQUEST DHCPACK T 1 VALID (MAC C1, IP C1 ) No lease renewal FORCERENEW τ 1 INVALID (MAC C1, IP C1 ) Fig. 4(b) shows the second case of client-server interactions where DHCP client C 1 renews its lease automatically in normal cases. If C 1 doesn t renew after lease expires, DHCP 6
7 server S will send FORCERENEW message to it. If for some period of time τ 1, C 1 still doesn t renew its lease, (MAC C1, IP C1 ) will be marked as invalid pair. Thirdly, when a non-dhcp host D 1 registers to monitoring daemon via some registration procedure or notifies to DHCP server S via DHCPINFORM messages, monitoring daemon will inform the valid pair (MAC D1, IP D1 ) to bridge B. D 1 will then be able to connect through the bridge. The process is shown in Fig. 4(c). Non-DHCP host D 1 DHCP server S Daemon D Bridge B Notification DHCPINFORM VALID (MAC D1, IP D1 ) T 2 Or registration REGISTER OK Fig. 4(c) shows the third case of client-server interactions where non-dhcp host D 1 notifies with DHCPINFORM message to DHCP server or registers via registration client to Daemon D. Lastly, when a manually configured host N 1 makes its connection attempts as shown in Fig. 4(d). Non-DHCP host N 1 DHCP server S Daemon D Bridge B Connection without Registration Connection Attempt FORCERENEW NOTIFY GETRULE Packet dropped Forced registration REGISTER OK or RHCPRENEW Fig. 4(d) shows the fourth case of client-server interactions where non-dhcp host N 1 attempts to connect without registration. N 1 will be denied of Internet access until registration is completed. Since N 1 is not registered to monitoring daemon D, bridge B will by default drop its packets and mark (MAC N1, IP N1 ) as invalid. Daemon D will periodically poll from the system logs of bridge B and get the list of such illegal hosts. Then daemon D will either send RHCPRENEW messages to these illegal hosts one by one or notify DHCP server S, which in turn sends FORCERENEW messages. When N 1 receives such messages, it can either respond with registration requests to daemon D or it can send DHCPINFORM message to DHCP server S. If neither was done, after a period of time τ 1 (a configurable parameter), DHCP server will inform daemon D of an invalid pair (MAC N1, IP N1 ) and N 1 will be prohibited from passing through bridge B as in the second case above. 7
8 Structural Differences: Wired vs. Wireless Environment In a switched environment, our DHCP-based management infrastructure can be illustrated as in Fig. 5. host host Switch Filtering DB Console port R RS-232 Internet DHCP server Daemon Lease ACL Fig. 5 shows the DHCP-based management infrastructure in a switched environment. Monitoring daemon is configured to connect through two interfaces: an Ethernet link to contact with DHCP server and other hosts, and a RS-232 link to collect information from and enforce rules to the switch. Note that DHCP server could be standalone or integrated with monitoring daemon. If DHCP server is combined with monitoring daemon, some traffic can be reduced but the load would be higher. Slight overhead under such switched environment is inevitable unless the daemon/dhcp server modules could be hardwired into the switch. In the case of wireless networks, a software access point with Filtering Database is similar to the role of a switch in wired environment as shown in Fig. 6. Mobile host RF module Software AP Filtering DB R Internet Mobile host Wireless LAN DHCP server Lease Daemon ACL Fig. 6 shows the DHCP-based management infrastructure in a wireless environment. However, there are some differences between these two infrastructures. Firstly, monitoring daemon needs not but would be better integrated into the software AP as a module. In the case of wired environment, a daemon module cannot be integrated into a hardware-based switch unless the switch is re-designed to do so. That s the reason why we incorporate a software-based AP instead of hardware-based one. Actually, we could also use normal hardware-based AP since under normal configurations it will eventually connect through switches somewhere in the switched environment. The 8
9 advantage of software AP is its flexibility and access control at the very first point of attachment for mobile hosts. Secondly, DHCP server will usually be on the Ethernet-side of the AP rather than the RF-side. That means DHCP requests from mobile hosts will pass through the software AP to DHCP server which incurs overhead for both wireless LAN and the Ethernet. If DHCP server is also integrated into the software AP, more traffic will be reduced on both wired and wireless networks. Implementation Issues and Alternatives (1) Layer 2 vs. Layer 3 Switches For layer 2 switches, only MAC addresses are inspected and added into packet filtering rules of Filtering Database. Such level of control is not tight enough in some cases as shown in the following IP-spoofing example. In the first place, when hosts A and B with (MAC A, IP A ) and (MAC B, IP B ) respectively are trusted by our server, layer 2 switch will mark MAC A and MAC B as authorized. However, when trusted host A tries to send packets using the same IP address as trusted host B, layer 2 switch will not notice invalid packets from (MAC A, IP B ) since the Filtering Database lacks layer 3 information when trying to keep track of invalid host connections. This will cause big problems since unauthorized hosts can gain access rights in this way. On the other hand, with layer 3 switches, the problem can be solved since the Filtering Database could contain both layer 2 and layer 3 information, i.e. all valid (MAC, IP) pairs. In the above example, layer 3 switch will mark (MAC A, IP A ) and (MAC B, IP B ) as authorized pairs. When host A starts sending spoofed packets with (MAC A, IP B ), layer 3 switch will notice these spoofed packets and no access will be allowed from host A. (2) Integrated vs. Separated Modules In our infrastructure, monitoring daemon and DHCP server are separated for illustration purpose only. In real implementation, we could have combined these two modules and experienced less overhead for inter-process communications. However, as individual functional modules, DHCP-related functions are better put together in a DHCP server module while communications between DHCP server and bridges in another separate monitoring module. That would be a cleaner design. (3) DHCP vs. RHCP options In RFC 3203 [3], it s not clearly specified when and how to trigger DHCP FORCERENEW. In our infrastructure, it s triggered by illegal connection attempts of DHCP-unaware hosts. With the installation of appropriate DHCP/RHCP modules on them, notification can be done via DHCP FORCERENEW or RHCP messages. 9
10 Related Works IEEE 802.1X [12, 13] is now a standard for port-based network access control. It utilizes existing EAP (Extensible Authentication Protocol) [14] to provide authenticated network access for IEEE 802 media, including Ethernet, Token Ring, and wireless LAN [9]. The EAP messages encapsulated in 802.1X frames are called EAPOL, or EAP over LAN. There are three entities involved in 802.1X authentication: Supplicant, Authenticator, and Authentication Server. As shown in Fig. 7, Supplicant is the client being authenticated, while Authenticator is the entity requiring authentication, and the real authentication takes place in Authentication Server. Authenticator (e.g. wireless Authentication Supplicant AP) Server Fig. 7 shows the general topology of the three entities involved in IEEE 802.1X authentication. For example, in a wireless LAN, the principle of operation for IEEE 802.1X authentication is depicted in Fig. 8. Authentication Process EAPOL Supplicant (mobile host) Port Connect EAPOL-Start EAP-Request/Identity EAP-Response/Identity EAP-Request EAP-Response EAP-Success Authenticator (wireless AP) EAP over RADIUS Access Blocked RADIUS-Request RADIUS-Challenge RADIUS-Request RADIUS-Accept Authentication Server Port Connect Access Allowed Fig. 8 shows the principle of operation for IEEE 802.1X authentication in a wireless LAN. When a mobile host tries to connect through the nearest access point (AP) in a wireless LAN, the AP will open a port and forced it into un-authenticated state in which only 802.1x packets will be able to pass. Then the client starts the authentication request by sending an EAPOL-Start message, and the AP will request its identity and forward the responses to the Authentication Server. As an optional support in 802.1X, RADIUS [15, 16] is used between Authenticator and Authentication Server. After finishing the authentication work, Authentication Server will pass the result back to Authenticator, which will set the port state into 10
11 authenticated state. Then the client will be able to connect through the AP. As compared to our DHCP-based approach in this paper, there are several differences between IEEE 802.1X and our infrastructure: 1. IEEE 802.1X explicitly requires authentication requests to be sent from clients, and an authentication server is necessary. In our approach, DHCP clients do not need explicit authentication since it s all done in the process of resource allocation. For DHCP-unaware hosts, a simple registration process is also needed, but the handling of registration requests is integrated in DHCP server, the central management server in our infrastructure, eliminating extra overhead. 2. In normal network configurations, DHCP server may already be operating, but not authentication server. In addition to our DHCP-based mechanism, we could have also adopted IEEE 802.1X and authentication server as an extra layer of control, which adds much overhead for DHCP clients. 3. DHCP server costs less and it s simpler to integrate access control functionality. One drawback is that accounting abilities may not be provided. 4. IEEE 802.1X is a port-based network access control scheme. In our approach, we extend the idea further to MAC layer user authentication and access control. Applying finer level of access control we can truly differentiate the real identity of intranet hosts, thus guarantee the authenticity. Finer access control leads to better local host management and conflict prevention. Conclusion As more and more new options were proposed, DHCP has become more powerful and complex in functionality. However, intranet management may become further complicated if DHCP mechanism could not be enforced among DHCP clients as well as manually configured hosts. In this paper, we proposed a management infrastructure that strengthens DHCP with MAC bridges such as Ethernet switches and wireless access points. We also showed some possible uses of new DHCP options like DHCPINFORM messages and DHCP reconfigure extension. Only through the cooperation of DHCP server and MAC bridges can we unleash the power of DHCP while restricting illegal accesses for both DHCP clients and externally configured hosts. If this management scheme is carried out over the whole intranet, we will be able to regulate malicious hosts from making unauthorized network connections. Local configuration conflicts can thus be reduced to the minimum, and a better networking environment can be expected. 11
12 References [1] R. Droms, Dynamic Host Configuration Protocol, RFC 2131, March [2] S. Alexander and R. Droms, DHCP Options and BOOTP Vendor Extensions, RFC 2132, March [3] Y. T Joens, C. Hublet and P. D. Schrijver, DHCP reconfigure extension, RFC 3203, December [4] ISO/IEC Final CD :1997, Information Technology Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks Common Specifications Part 3: Media Access Control (MAC) Bridges: Revision (current draft available as IEEE P802.1D/D15), November [5] W. Wimer, Clarifications and Extensions for the Bootstrap Protocol, RFC 1542, October [6] Microsoft Corporation, How to Cause Windows 98 to Release DHCP Lease Information at Shutdown, Internet article at October [7] J. H. Wang, Tzao-Lin Lee, and Hsi-Hui Lin, "Remote Host Configuration Protocol: Configuring a Remote Host in a User-Friendly Manner," Proceedings of the 14th International Conference on Advanced Science and Technology (ICAST 98), pp Illinois, U.S.A., April [8] J. H. Wang and T. L. Lee, Extending DHCP with MAC-Layer User Authentication, Proceedings of the 1st International Workshop on Software Engineering and Multimedia Applications, pp , Baden-Baden, Germany, August [9] Information Technology Telecommunications and Information Exchange between System Local and Metropolitan Area Networks Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std , [10] J. Case, M. Fedor, M. Schoffstall, and J. Davin, A Simple Network Management Protocol (SNMP), STD 15, RFC 1157, May [11] 3Com Corporation, SuperStack II Switch: Management Guide, April [12] IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control, IEEE Std X-2001, June [13] P. Congdon, IEEE 802.1X Overview: Port Based Network Access Control, Internet article at: March [14] L. Blunk and J. Vollbrecht, PPP Extensible Authentication Protocol (EAP), RFC 2284, March [15] C. Rigney, A. Rubens, W. Simpson, S. Willens, Remote Authentication Dial In User Service (RADIUS), RFC 2865, June [16] P. Congdon, B. Aboba, T. Moore, A. Palekar, A. Smith, G. Zorn, D. Halasz, A. Li, A. P. Young, and J. Roese, IEEE 802.1X RADIUS Usage Guidelines, IETF Internet Draft: IETF, August
IEEE 802.1X Overview. Port Based Network Access Control
IEEE 802.1X Overview Port Based Network Access Control 802.1X Motivation and History Increased use of 802 LANs in public and semi-public places Desire to provide a mechanism to associate end-user identity
Using IEEE 802.1x to Enhance Network Security
Using IEEE 802.1x to Enhance Network Security Table of Contents Introduction...2 Terms and Technology...2 Understanding 802.1x...3 Introduction...3 802.1x Authentication Process...3 Before Authentication...3
IEEE 802.1X For Wireless LANs
IEEE 802.1X For Wireless LANs John Roese, Ravi Nalmati, Cabletron Albert Young, 3Com Carl Temme, Bill McFarland, T-Span David Halasz, Aironet Paul Congdon, HP Andrew Smith, Extreme Networks Slide 1 Outline
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Chapter 10 Security Protocols of the Data Link Layer
Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2006/2007 10.1 Scope of Link Layer Security Protocols
Investigation of DHCP Packets using Wireshark
Investigation of DHCP Packets using Wireshark Mohsin khan Faculty of Telecommunication Engineering and Environment Birmingham City University England Saleh Alshomrani Faculty of Computing and IT King Abdulaziz
Configuring Wired 802.1x Authentication on Windows Server 2012
Configuring Wired 802.1x Authentication on Windows Server 2012 Johan Loos [email protected] Version 1.0 Why 802.1x Authentication? The purpose of this document is to guide you through the procedure
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Networking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
How To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security
HARTING Ha-VIS Management Software
HARTING Ha-VIS Management Software People Power Partnership HARTING Management Software Network Management Automation IT - with mcon Switches from HARTING With the Ha-VIS mcon families, HARTING has expanded
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Logical & Physical Security
Building a Secure Ethernet Environment By Frank Prendergast Manager, Network Certification Services Schneider Electric s Automation Business North Andover, MA The trend toward using Ethernet as the sole
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack
Network Security Total solution for your network security With the growth of the Internet, malicious attacks are happening every minute, and intruders are trying to access your network, using expensive
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz
Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN Daniel Schwarz Overview: 1. Introduction I. PKIX 2. Basics I. PPP II. EAP III. 802.1x IV. X.509 certificate extensions
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2 1 Dept of CSE, P.A.College of Engineering 2 Dept of CSE, Srnivas institute
Authentication and Security in IP based Multi Hop Networks
7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
A DHCP Primer. Dario Laverde, [email protected]. 2002 Dario Laverde
A DHCP Primer Dario Laverde, [email protected] 2002 Dario Laverde Dynamic Host Configuration Protocol DHCP Client DHCP DHCP Server Dynamic Host Configuration consists of at least an IP address in
Local Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Bridge Functions Consortium
Port-Based Network Access Control Technical Document Revision 2.0 University of New Hampshire 121 Technology Drive, Suite 2 Durham, NH 03824-4716 Phone: +1-603-862-3525 http://www.iol.unh.edu Fax: +1-603-862-4181
Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes
Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
8. Firewall Design & Implementation
DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or
Chapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Chapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)
QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p
Implementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities
Firewalls CSCI 454/554
Firewalls CSCI 454/554 Why Firewall? 1 Why Firewall (cont d) w now everyone want to be on the Internet w and to interconnect networks w has persistent security concerns n can t easily secure every system
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones
802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones Abstract The purpose of this document is to discuss 802.1X Authentication and Link Layer Discovery Protocol (LLDP) in
FIREWALLS IN NETWORK SECURITY
FIREWALLS IN NETWORK SECURITY A firewall in an information security program is similar to a building s firewall in that it prevents specific types of information from moving between the outside world,
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Computer Networking. Definitions. Introduction
Computer Networking Definitions DHCP Dynamic Host Configuration Protocol It assigns IP addresses to client devices, such as desktop computers, laptops, and phones, when they are plugged into Ethernet or
Module 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
Application Protocols for TCP/IP Administration
Application Protocols for TCP/IP Administration BootP, TFTP, DHCP Agenda BootP TFTP DHCP BootP, TFTP, DHCP, v4.4 2 Page 60-1 BootP (RFC 951, 1542, 2132) BootP was developed to replace RARP capabilities
How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)
Wireless LAN Security with 802.1x, EAP-TLS, and PEAP Steve Riley Senior Consultant MCS Trustworthy Computing Services So what s the problem? WEP is a euphemism Wired Equivalent Privacy Actually, it s a
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2)
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) SUNY Technology Conference June 21, 2011 Bill Kramp FLCC Network Administrator Copyright 2011 William D. Kramp All Rights
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
Chapter 4: Security of the architecture, and lower layer security (network security) 1
Chapter 4: Security of the architecture, and lower layer security (network security) 1 Outline Security of the architecture Access control Lower layer security Data link layer VPN access Wireless access
Network Access Security It's Broke, Now What? June 15, 2010
Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Wireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
Lecture Objectives. Lecture 6 Mobile Networks: Nomadic Services, DHCP, NAT, and VPNs. Agenda. Nomadic Services. Agenda. Nomadic Services Functions
Lecture Objectives Wireless Networks and Mobile Systems Lecture 6 Mobile Networks: Nomadic Services, DHCP, NAT, and VPNs Describe the role of nomadic services in mobile networking Describe the objectives
Internet Filtering Appliance. User s Guide VERSION 1.2
Internet Filtering Appliance User s Guide VERSION 1.2 User s Guide VERSION 1.2 InternetSafety.com, Inc 3979 South Main Street Suite 230 Acworth, GA 30101 Phone 678 384 5300 Fax 678 384 5299 1 Table of
Chapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,
Configuring DHCP Snooping
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.
What information will you find in this document?
AlliedWare TM OS How To Configure Basic 802.1x Port Authentication Introduction This How To Note is a guide to 802.1x and Port Authentication. It outlines the implementation of the IEEE 802.1x standard
Executive Summary. This white paper includes the following sections: A.What Does 802.1x Do? B. An Overview of the 802.1x Standard
Allied Telesis White Paper 802.1x White Paper Executive Summary Security and flexibility are often seen as mutually exclusive requirements in a network, yet both are equally important. Security is crucial
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
DHCP Failover. Necessary for a secure and stable network. DHCP Failover White Paper Page 1
DHCP Failover Necessary for a secure and stable network DHCP Failover White Paper Page 1 Table of Contents 1. Introduction... 3 2. Basic DHCP Redundancy... 3 3. VitalQIP Failover Solution... 5 4. VitalQIP
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4
802.1x in the Enterprise Network
802.1x in the Enterprise Network Harrison Forest ICTN 6823 Abstract: This paper aims to provide a general over view of 802.1x authentication and its growing importance on enterprise networks today. It
What is Firewall? A system designed to prevent unauthorized access to or from a private network.
What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? (cont d) Firewall is a set of related programs, located at a network gateway server. Firewalls
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
CCNA Exploration: Accessing the WAN Chapter 7 Case Study
Objectives: Mitigate attacks based on DHCP rogue servers. Intro: ChurchBells Inc. is having connectivity issues and needs your help. The Scenario: According to the reports, some user PCs within the company
Gigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
Lecture 3. WPA and 802.11i
Lecture 3 WPA and 802.11i Lecture 3 WPA and 802.11i 1. Basic principles of 802.11i and WPA 2. IEEE 802.1X 3. Extensible Authentication Protocol 4. RADIUS 5. Efficient Handover Authentication 1 Lecture
Recommended IP Addressing Methods for EtherNet/IP Devices
Recommended IP Addressing Methods for EtherNet/IP Devices Version: 1.0 10-June-2003 Published by EtherNet/IP Implementors Workshop Open DeviceNet Vendor Association (ODVA) ControlNet International (CI)
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 2600 COURSE TITLE: Network Fundamentals PREREQUISITE(S): CTS 1131 and CTS 1133 COREQUISITE(S): STUDENT
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004
Prestige 202H Plus ISDN Internet Access Router Quick Start Guide Version 3.40 12/2004 Table of Contents 1 Introducing the Prestige...3 2 Hardware Installation...4 2.1 Rear Panel...4 2.2 The Front Panel
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
Gigabit Content Security Router
Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security
Configuring DHCP. DHCP Server Overview
Configuring DHCP This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP). For a complete description of the DHCP commands listed in this chapter, refer to the DHCP s chapter
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
