Category Networks

Computer Networks

This post is an introduction to computer networks. Computer Network Devices Computer network devices includes switch, routers or firewalls. You can read this post about computer network devices. Area Networks Examples of area networks are WAN or LAN. You can…

Software-defined Network

A software-defined network (SDN) is an approach to network management that enables dynamic and programmatically network configuration. This is a contrast with traditional networks, where the network is defined by using hardware components. An SDN looks like a single logical…

Proxy Server

A proxy server is a variation of an application-level firewall or circuit-level firewall. It is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Possible proxy features: Proxy Server…

Authentication Protocols

This post features computer network authentication protocols. Do not confuse the authentication protocols with the Authentication, Authorization and Accountability (AAA) protocols like RADIUS or TACACS+. Authentication protocols works in the OSI layers 2 and 3, and AAA protocols in layer…

AAA Network Protocols

This post summarizes Authentication, Authorization and Accountability (AAA) protocols or AAA network protocols. Do not confuse the AAA protocols with the authentication protocols like EAP, CHAP and PAP. Authentication protocols works in the OSI layers 2 and 3, and AAA…

Identity and Access Management

Identity and Access Management (IAM) is one of the basics of information security. Concepts related to Authentication Continuous authentication Monitors user behavior continuously to ensure that the authenticated user remains the same throughout a session. Risk-based authentication analyzes user behavior…

Network Access Control

Network Access Control (NAC) is a security solution that enforces policy on devices that access networks to increase network visibility and reduce risk. NAC’s posturing capability determines if a system is sufficiently secure and compliant enough to connect to a…

Email Protocols

This post presents some aspects related to electronic mail (email or e-mail) protocols. Email Operational Protocols POP3 Post Office Protocol 3 (POP3) is considered deprecated. IMAP Internet message access protocol (IMAP) STMP An open relay is an insecure SMTP server…