Network Defense Strategies: Securing Your Network and VPNs Explained

slide1 n.w
1 / 15
Embed
Share

Discover the essential aspects of network defense, including securing your network, VPNs, tunneling protocols, and access control. Explore topics such as remote access, site-to-site VPNs, tunneling protocols like IPsec and TLS, and network access control through health agents and NAC agents.

  • Network Defense
  • VPNs
  • Tunneling Protocols
  • Access Control
  • Cybersecurity

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. 1213 Network Defense Lecture 4Part 3 # Securing Your Network Securing Your Network - Lecture 1 King Saud University Applied Studies and Community Service 1213

  2. Remote Access VPNs and VPN concentrators - Lecture 1 King Saud University Applied Studies and Community Service 1213

  3. IPsec as a tunneling protocol Authentication AH provides authentication &integrity (protocol ID 51) Encryption ESP adds confidentiality (protocol ID 50) Uses tunnel mode for VPNs with IKE over port 500 TLS as a tunneling Protocol Useful when VPN go through NAT SSTP uses TLS over port 443 text - Tunneling Protocols - Lecture 1 King Saud University Applied Studies and Community Service 1213

  4. Site-to-Site VPNs Gateways as VPN servers - Lecture 1 King Saud University Applied Studies and Community Service 1213

  5. Site-to-site VPNs Always-On VPNs Regular VPNs for users Mobile devices - Lecture 1 King Saud University Applied Studies and Community Service 1213

  6. L2TP not used by itself for VPN traffic Tunneling Protocols HTML5 VPN Portal allows users to connect to the VPN using their web browser - Lecture 1 King Saud University Applied Studies and Community Service 1213

  7. Health agents Inspects clients for predefined conditions Restricts access of unhealthy clients to a remediation network Used for VPN clients and internal clients Network Access Control - Lecture 1 King Saud University Applied Studies and Community Service 1213

  8. Permanent (Agent) Installed on client and remains on client Persistent NAC agent Dissolvable (Agentless) Does not stay on client Downloaded to client when session starts Removed during or after session Commonly used for mobile devices - NAC Agents - Lecture 1 King Saud University Applied Studies and Community Service 1213

  9. Identity and Access Services PAP Sends passwords in cleartext CHAP uses shared secret TACACS+ Cisco alternative to RADIUS Uses TCP port 49 Encrypts entire authentication process Uses multiple challenges and responses - Lecture 1 King Saud University Applied Studies and Community Service 1213

  10. Identity and Access Services RADIUS - Lecture 1 King Saud University Applied Studies and Community Service 1213

  11. AAA Protocols Provide authentication, authorization, and accounting Authentication verifies a user s identification Authorization provides access Accounting tracks user access with logs - Lecture 1 King Saud University Applied Studies and Community Service 1213

  12. From Appendix C Table 1 - Lecture 1 King Saud University Applied Studies and Community Service 1213

  13. From Appendix C Table 2 - Lecture 1 King Saud University Applied Studies and Community Service 1213

  14. Chapter 4 Summary Exploring Advanced Security Devices Securing Wireless Networks Understanding Wireless Attacks Using VPNs for Remote Access Check out the free online labs - Lecture 1 King Saud University Applied Studies and Community Service 1213

  15. End of Part Three - Lecture 1 King Saud University Applied Studies and Community Service 1213

More Related Content