31.07.2015 Views

network protocols handbook.pdf

network protocols handbook.pdf

network protocols handbook.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

102Protocols GuideSecurity and VPNProtocolsThe key <strong>protocols</strong> for AAA and VPN:AuthenticationAuthorizationAccountingTunnelingSecured RoutingOthersKerberos: Network Authentication ProtocolRADIUS: Remote Authentication Dial In UserServiceSSH: Secure Shell ProtocolL2F: Level 2 Forwarding protocolL2TP: Layer 2 Tunneling ProtocolPPTP: Point to Point Tunneling ProtocolDiffServ: Differentiated ServiceGRE: Generic Routing EncapsulationIPsec: Security Architecture for IP <strong>network</strong>IPsec AH: IPsec Authentication HeaderIPsec ESP: IPsecEncapsulating SecurityPayloadIPsec IKE: Internet Key Exchange ProtocolIPsec ISAKMP: Internet Security Associationand Key Management ProtocolTLS: Transport Layer Security ProtocolSocks: Protocol for sessions traversal acrossfirewall securelyReferencehttp://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/security.htmSecurities Technologies

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!