Chapter17.Accepting the Right People and Rejecting the Wrong People


Chapter 17. Accepting the Right People and Rejecting the Wrong People

What You Will Learn

After reading this chapter, you should be able to

  • List the three components of the AAA security model

  • Describe the basic processes used for authentication, authorization, and accounting

  • Explain the basic processing of customer usernames and passwords by an ISP

  • Explain the benefits of using VPNs to connect to an enterprise network through the Internet

If you've been reading this book from the first page, congratulations! You've made it to the final part of the book. You've already learned the basics of how to build networks that forward IP packets everywhere they need to go. Next, you'll read about some security mechanisms that help protect your network. This chapter focuses on how to make sure that only specific end user devices are allowed to use your network. These devices typically are attached either to a LAN or to an ISP. After these devices are attached, end users will need to access applications on servers. In this chapter, you'll learn the basics of how servers use usernames and passwords to make sure they know the identity of the person who is using the server. Along the way, you'll learn about two types of security issues related to Internet use.




Computer Networking first-step
Computer Networking First-Step
ISBN: 1587201011
EAN: 2147483647
Year: 2004
Pages: 173
Authors: Wendell Odom

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net