PartVI.Securing the Network


In Part VI, you learn about concepts and products that keep you safe by restricting users and packets from doing what they want and going where they want. Chapter 17 describes how to make sure end users are allowed to use a network and introduces you to the process of authentication, authorization, and accounting (AAA). Chapter 18 focuses on securing a company's connection to the Internet and preventing both curious and malicious people in the public Internet from doing harm to the devices inside a corporate enterprise network.


 

Chapter 17: Accepting the Right People and Rejecting the Wrong People

 

Chapter 18: Keeping a Watchful Eye Over Who Drives into Your (Network) Neighborhood




Computer Networking first-step
Computer Networking First-Step
ISBN: 1587201011
EAN: 2147483647
Year: 2004
Pages: 173
Authors: Wendell Odom

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net