The approach to network security through access control is technically different than implementing security controls at different network layers discussed in the earlier chapters of this tutorial. However, though the approaches of implementation are different, they are complementary to each other.
Network access control comprises of two main components: user authentication and network boundary protection. RADIUS is a popular mechanism for providing central authentication in the network.
Firewall provides network boundary protection by separating an internal network from the public Internet. Firewall can function at different layers of network protocol. IDS/IPS allows to monitor the anomalies in the network traffic to detect the attack and take preventive action against the same.
• Proxy firewall
• Application Layer
• Generation Firewalls
• Software Firewall
• Based Firewalls
• Web application firewalls
Need help? Visit our Support Group for help from our friendly Admins and members!
Visit The Temple