Chapter 17. Accepting the Right People and Rejecting the Wrong PeopleWhat You Will Learn After reading this chapter, you should be able to
If you've been reading this book from the first page, congratulations! You've made it to the final part of the book. You've already learned the basics of how to build networks that forward IP packets everywhere they need to go. Next, you'll read about some security mechanisms that help protect your network. This chapter focuses on how to make sure that only specific end user devices are allowed to use your network. These devices typically are attached either to a LAN or to an ISP. After these devices are attached, end users will need to access applications on servers. In this chapter, you'll learn the basics of how servers use usernames and passwords to make sure they know the identity of the person who is using the server. Along the way, you'll learn about two types of security issues related to Internet use. |