31.07.2015 Views

network protocols handbook.pdf

network protocols handbook.pdf

network protocols handbook.pdf

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

101Protocols GuideNetwork Security Technologies and ProtocolsDescriptionNetwork security covers such issues as <strong>network</strong> communication privacy,information confidentiality and integrity over <strong>network</strong>, controlled access torestricted <strong>network</strong> domains and sensitive information, and using the public<strong>network</strong> such as Internet for private communications. To address theseissues, various <strong>network</strong> and information security technologies have beendeveloped by various organizations and technology vendors. Here is a summaryof the technologies:AAA: Authorization, Authentication and Accounting is a technology for intelligentlycontrolling access to <strong>network</strong> resources, enforcing policies, auditingusage, and providing the information necessary to bill for services. Authenticationprovides a way of identifying a user, typically by having the user entera valid user name and valid password before access is granted. The authorizationprocess determines whether the user has the authority to accesscertain information or some <strong>network</strong> sub-domains. Accounting measuresthe resources a user consumes while using the <strong>network</strong>, which includesthe amount of system time or the amount of data a user has sent and/orreceived during a session, which could be used for authorization control,billing, trend analysis, resource utilization, and capacity planning activities.A dedicated AAA server or a program that performs these functions oftenprovides authentication, authorization, and accounting services.VPN: Virtual Private Network is a technology allowing private communicationsby business and individuals, such as remote access to a corporate<strong>network</strong> or using a public telecommunication infrastructure, such as the Internet.A virtual private <strong>network</strong> can also be a specially configured <strong>network</strong>over the public <strong>network</strong> infrastructure that is only used by one organization.Various <strong>network</strong>-tunneling technologies such as L2TP have been developedto reach this goal. Using encryption technologies such as IPsec could furtherenhance information privacy over <strong>network</strong> and virtual private <strong>network</strong>s.Firewall: Firewall is a software program or hardware device that filters theinformation coming through the Internet connection into a private <strong>network</strong>or computer system. Firewalls use one or more of three methods to controltraffic flowing in and out the <strong>network</strong>:• Packet filtering - Packets are analyzed against a set of filters. Packetsthat make it through the filters are sent to the requesting systemand all others are discarded.• Proxy service - Information from the Internet is retrieved by the firewalland then sent to the requesting system and vice versa.• Stateful inspection - compares certain key parts of packets passingthrough with a database of trusted information. Outgoing informationfrom inside the firewall is monitored for specific defining characteristics,and incoming information is then compared with these characteristics.If the comparison yields a reasonable match, the informationis allowed through. Otherwise it is discarded.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!