Date of Issue: 09-01-2023 Rate this Study Guide


Securing Communications, Part 2

by Annlee Hines

Introduction
    Multiplexed Switched Circuits
  Relevance
  Where We've Been
  Architecture
  Content
  Tunnels and VPNs
Host-Based Security
    Just Which Devices Do You Need to Secure?
  Sockets
  Authentication
  TCP Wrapper
SSH
  SSH Operation
  Cisco Implementation
SSL/TLS
  SSL
  TLS
  Cisco Implementation
CEP
    PKCS
  Certificate Benefits
  Certificate Enrollment
  Certificate Revocation
  Certificate Query
  CRL Query (Certificate Revocation List)
Tunnels and VPN Implementation
  GRE
  L2F
  PPTP
  L2TP
  MPLS
  VPNs and VPDNs
Conclusion
Additional Resources
  Cryptography and Public Keys
  SSH
  SSL
  CEP
  Tunneling
  VPNs
  Books


Copyright © 2002 Genium Publishing Corporation