TAILIEUCHUNG - Network Perimeter Security

LANs, WANs, WLANs are known as edge networks May be contained within businesses or homes Needs to be protected from the rest of the Internet! Why firewall? Encryption? Cannot stop malicious packets from getting into an edge network Authentication? Can determine whether an incoming IP packet comes from a trusted user However, not all host computers have resources to run authentication algorithms Host computers managed by different users with different skill levels. | J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Outline General Framework Packet Filters Circuit Gateways Application Gateways Trusted Systems and Bastion Hosts Firewall Configuration Network Address Translations Setting Up Firewalls J. Wang. Computer Network Security Theory and Practice. Springer 2008 LANs, WANs, WLANs are known as edge networks May be contained within businesses or homes Needs to be protected from the rest of the Internet! Why firewall? Encryption? Cannot stop malicious packets from getting into an edge network Authentication? Can determine whether an incoming IP packet comes from a trusted user However, not all host computers have resources to run authentication algorithms Host computers managed by different users with different skill levels. Overview J. Wang. Computer Network .

Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.