Objective 6.3: Network Access Security

From Wikibooks, open books for an open world
Jump to: navigation, search


Objective 6.3: Explain the methods of network access security

ACL (Access Control List)[edit]

MAC (Media Access Control) filtering[edit]

IP (Internet Protocol) address filtering[edit]

Tunneling and encryption[edit]

SSL VPN (Secure Sockets Layer Virtual Private Network)[edit]

o An SSL VPN (Secure Sockets Layer virtual private network) is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer. It's used to give remote users with access to Web applications, client/server applications and internal network connections.

A virtual private network (VPN) provides a secure communications mechanism for data and other information transmitted between two endpoints. An SSL VPN consists of one or more VPN devices to which the user connects by using his Web browser. The traffic between the Web browser and the SSL VPN device is encrypted with the SSL protocol or its successor, the Transport Layer Security (TLS) protocol. An SSL VPN offers versatility, ease of use and granular control for a range of users on a variety of computers, accessing resources from many locations. There are two major types of SSL VPNs: SSL Portal VPN: This type of SSL VPN allows for a single SSL connection to a Web site so the end user can securely access multiple network services. • The site is called a portal because it is one door (a single page) that leads to many other resources. The remote user accesses the SSL VPN gateway using any modern Web browser, identifies himself or herself to the gateway using an authentication method supported by the gateway and is then presented with a Web page that acts as the portal to the other services. • SSL Tunnel VPN: This type of SSL VPN allows a Web browser to securely access multiple network services, including applications and protocols that are not Web-based, through a tunnel that is running under SSL. SSL tunnel VPNs require that the Web browser be able to handle active content, which allows them to provide functionality that is not accessible to SSL portal VPNs. Examples of active content include Java, JavaScript, Active X, or Flash applications or plug-ins. [1] http://searchsecurity.techtarget.com/definition/SSL-VPN

VPN (Virtual Private Network)[edit]

L2TP (Layer 2 Tunneling Protocol)[edit]

PPTP (Point-to-Point Tunneling Protocol)[edit]

IPsec (Internet Protocol Security)[edit]

Remote access[edit]

RAS (Remote Access Service)[edit]

RDP (Remote Desktop Protocol)[edit]

PPPoE (Point-to-Point Protocol over Ethernet)[edit]

PPP (Point-to-Point Protocol)[edit]

VNC (Virtual Network Computing)[edit]

ICA (Independent Computing Architecture)[edit]

« Network Security
Objective 6.3: Network Access Security
»
Objective 6.2: Firewall Features Objective 6.4: User Authentication
  1. http://searchsecurity.techtarget.com/definition/SSL-VPN