en CCNAS v11 ch06 securing the local area network

Wireless Local Area Networks

Wireless Local Area Networks

... freely roam between APs 17 Summary • The wireless technology that attracts the most attention today – Radio frequency (RF) wireless local area networks (WLANs) • Wireless NIC performs same functions ... of wireless clients and an AP • Extended Service Set (ESS) – Two or more BSS wireless networks installed in same area – Provides users with uninterrupted mobile access to t...
Ngày tải lên : 13/09/2012, 10:52
  • 18
  • 529
  • 0
LÝ THUYẾT VỀ MẠNG LAN (LOCAL AREA NETWORK)

LÝ THUYẾT VỀ MẠNG LAN (LOCAL AREA NETWORK)

... PHẦN I LÝ THUYẾT Trang NGUYỄN ĐÌNH CÔNG – 36CLTH 22 CHƯƠNG I LÝ THUYẾT VỀ MẠNG LAN (LOCAL AREA NETWORK) I / CÁC KIẾN TRÚC MẠNG : Hình dạng mạng cục thể qua cấu trúc hay hình học đường dây cáp mạng ... Một mạng LAN tổng hợp mạng không dây Nếu phân loại theo diện hoạt động, mạng máy tính phân chia thành: • Mạng cục ( Local Area Network - LAN ) • Mạng diện rộng (Wid...
Ngày tải lên : 25/04/2013, 11:58
  • 109
  • 1.8K
  • 6
Wireless Local Area Network

Wireless Local Area Network

... IEEE802.11b IEEE802.11g XU THẾ PHÁT TRIỂN CỦA WLAN TỔNG QUAN Mạng LAN không dây viết tắt WLAN (Wireless Local Area Network) , mạng dùng để kết nối hai hay nhiều máy tính với mà không sử dụng dây dẫn WLAN ... Institute of Electrical and Electronic Engineers (IEEE) phác thảo chuẩn 802.11 cho WLANs (Wireless Local Area Networking) WLAN mạng cục không dây cho phép kết nối không dây eth...
Ngày tải lên : 01/09/2013, 10:30
  • 34
  • 473
  • 1
Tài liệu The Case for Virtual Local Area Networks (VLANs) ppt

Tài liệu The Case for Virtual Local Area Networks (VLANs) ppt

... The Case for Virtual Local Area Networks (VLANs) Ted Rohling, Global Knowledge Instructor, CISSP Introduction In the history of Ethernet, the virtual LAN is a recent addition The VLAN ... results The reason for the failure is that the Ethernet packets going over the trunk ports have a different format 802.1Q Trunking Protocol The IEEE 802.1Q trunking prot...
Ngày tải lên : 17/01/2014, 06:20
  • 11
  • 384
  • 0
wireless ad hoc networking personal-area, local-area, and the sensory-area networks

wireless ad hoc networking personal-area, local-area, and the sensory-area networks

... Hu, and Masayuki Fujise ISBN: 0-8493-8036-7 Wireless Mesh Networking: Architectures, Protocols and Standards Yan Zhang, Jijun Luo and Honglin Hu ISBN: 0-8493-7399-9 Wireless Ad Hoc Networking: Personal-Area, ... orders@crcpress.com WIRELESS AD HOC NETWORKING Personal-Area, Local-Area, and the Sensory-Area Networks Edited by Shih-Lin Wu Yu-Chee Tseng Boca...
en CCNAS v11 ch01 modern network security threats

en CCNAS v11 ch01 modern network security threats

... wide-open world of the Internet, the networks of today are more open © 2012 Cisco and/or its affiliates All rights reserved Threats • There are four primary classes of threats to network security: ... affiliates All rights reserved 31 Trends Driving Network Security • Increase of network attacks • Increased sophistication of attacks • Increased dependence on the network • Wirel...
en CCNAS v11 ch02 securing network devices

en CCNAS v11 ch02 securing network devices

... be utilized: – Enforce minimum password length: security passwords min-length – Disable unattended connections: exec-timeout – Encrypt config file passwords: service password-encryption © 2012 ... occurs and when Authenticate access – Ensure that access is granted only to authenticated users, groups, and services – Limit the number of failed login attempts and the time between logins © ... re...
en CCNAS v11 ch03 authentication, authorization, and accounting

en CCNAS v11 ch03 authentication, authorization, and accounting

... auxiliary, and console login, exec, and enable commands Packet (interface mode) Dial-up and VPN access including asynchronous and ISDN (BRI and PRI) ppp and network commands © 2012 Cisco and/ or its ... AAA Accounting Remote Client Cisco Secure ACS Server AAA Router 1.When a user has been authenticated, the AAA accounting process generates a start message to begin the accoun...
en CCNAS v11 ch04 implementing firewall technologies

en CCNAS v11 ch04 implementing firewall technologies

... statement is added to the end Without sequence numbers the only way to add a statement between existing entries was to delete the ACL and recreate it • • Likewise, the only way to delete an entry ... to fully implement a security policy Order of statements: – ACLs have a policy of first match; when a statement is matched, the list is no longer examined – Ensure that statements at the top ......
en CCNAS v11 ch05 implementing intrusion prevention

en CCNAS v11 ch05 implementing intrusion prevention

... Event Monitoring and Management There are two key functions of event monitoring and management: Real-time event monitoring and management Analysis based on archived information (reporting) Event ... Features Sensors are connected to network segments A single sensor can monitor many hosts Sensors are network appliances tuned for intrusion detection analysis The operating system is “hardened....
en CCNAS v11 ch06 securing the local area network

en CCNAS v11 ch06 securing the local area network

... the frames to the wrong VLAN – The first switch strips the first tag off the frame and forwards the frame – The second switch then forwards the packet to the destination based on the VLAN identifier ... managing online users The Cisco NAM manages the Cisco NAS, which is the enforcement component of the Cisco NAC Appliance Cisco NAC Appliance Agent (NAA) – – Optiona...
en CCNAS v11 ch07 cryptographic systems

en CCNAS v11 ch07 cryptographic systems

... reserved Authentication • Data nonrepudiation is a similar service that allows the sender of a message to be uniquely identified • This means that a sender / device cannot deny having been the source ... Cipher • When Julius Caesar sent messages to his generals, he didn't trust his messengers • He encrypted his messages by replacing every letter: – A with a D – B with an E – and so on • His g...
en CCNAS v11 ch08 implementing virtual private networks

en CCNAS v11 ch08 implementing virtual private networks

... Conventional Private Networks © 2012 Cisco and/or its affiliates All rights reserved 15 Virtual Private Networks © 2012 Cisco and/or its affiliates All rights reserved 16 VPNs • A Virtual Private Network ... does not provide confidentiality (encryption) – It is appropriate to use when confidentiality is not required or permitted – All text is transported unencrypted • It only en...
en CCNAS v11 ch09 managing a secure network

en CCNAS v11 ch09 managing a secure network

... username scpADMIN privilege 15 password scpPa55W04D ip domain-name scp.cisco.com crypto key generate rsa general-keys modulus 1024 aaa new-model aaa authentication login default local aaa authorization ... steps: – Step Enable AAA with the aaa new-model global configuration command – Step Define a named list of authentication methods, with the aaa authentication login {default |list-name} m...
en CCNAS v11 ch10 implementing the cisco adaptive security appliance (ASA)

en CCNAS v11 ch10 implementing the cisco adaptive security appliance (ASA)

... the pre-installed licenses creates a permanent license – – The permanent license is activated by installing a permanent activation key using the activation-key command Only one permanent license ... conf t ciscoasa(config)# hostname CCNAS- ASA CCNAS- ASA(config)# domain-name ccnasecurity.com CCNAS- ASA(config)# enable password class CCNAS- ASA(config)# passwd cisco CCNAS- ASA(con...