Date of Issue:
09-01-2023
Rate this Study Guide
Securing Communications, Part 2
by
Annlee Hines
Introduction
Multiplexed Switched Circuits
Relevance
Where We've Been
Architecture
Content
Tunnels and VPNs
Host-Based Security
Just Which Devices Do You Need to Secure?
Sockets
Authentication
TCP Wrapper
SSH
SSH Operation
Cisco Implementation
SSL/TLS
SSL
TLS
Cisco Implementation
CEP
PKCS
Certificate Benefits
Certificate Enrollment
Certificate Revocation
Certificate Query
CRL Query (Certificate Revocation List)
Tunnels and VPN Implementation
GRE
L2F
PPTP
L2TP
MPLS
VPNs and VPDNs
Conclusion
Additional Resources
Cryptography and Public Keys
SSH
SSL
CEP
Tunneling
VPNs
Books
Copyright © 2002 Genium Publishing Corporation