🖌️
Networking
  • Introduction
  • Networking and Topology
    • Networking
    • Topology
    • Types of Topologies
  • Firewall
    • Firewall
    • Types of Firewall
    • Stateful vs Stateless Firewalls
    • Content Filtering
    • Signature Identification
    • IDS/IPS
  • MAC Address
    • MAC Address
  • OSI Model
    • OSI Model
    • Layers of OSI Model
  • IP Address
    • IP Address
    • Subnet Mask
    • IP Classes and Ranges
  • Subnetting
    • Subnetting
  • IP Addressing Methods
    • IP Addressing Methods
  • TCP/IP Protocol Suites
    • TCP/IP Protocol Suites
  • Ports
    • Ports
  • Networking Services
    • Networking Services
  • Routing Protocols
    • Routing Protocols
  • WAN Technologies
    • WAN Technologies
  • Internet Access Technologies
    • Internet Access Technologies
  • Network Types
    • Network Types
  • Remote Access Protocols and Services
    • Remote Access Protocols and Services
    • VPN (Virtual Private Network)
    • Types of VPN connections
  • Authentication Protocols
    • Authentication Protocols
  • Cloud and Virtualization
    • Cloud and Virtualization
  • Cloud Computing
    • Cloud Computing
    • Type of Cloud Computing
  • VLAN, Intranet and Extranet
    • VLAN, Intranet and Extranet
  • Optimization and Fault Tolerance
    • Optimization and Fault Tolerance
    • Backup Services
    • Disaster Recovery
  • Security Protocols
    • Security Protocols
    • Types of Protection
  • SOHO Routers
    • SOHO Routers
  • Network Utilities
    • Network Utilities
  • Networking Issues
    • Networking Issues
  • Troubleshooting Strategy
    • Troubleshooting Strategy
Powered by GitBook
On this page

Was this helpful?

  1. Security Protocols

Types of Protection

Types of Protection

Types of Protection

Provides protection in 3 ways -

Authenticates the server. Authenticates the client. Encrypts the data.

TLS (Transport Layer Security) -

It is the latest industry standard SSL protocol - it is the successor to SSL.

It is based on the same specifications.

Authenticates to server, the client and encrypts the data TLS is made up of 2 layers -

TLS Record Protocol -

Provides connection security by making sure the connection is private and reliable.

TLS Handshake Protocol -

Allows the server and client to authenticate each other and negotiate an encryption algorithm and cryptographic keys before data is sent.

The goal for TLS is to make SSL safer and more secure.

802.1x -

Used for both wired and wireless networks.

Controls network access by ports.

Port based authentication so if authentication passes, the port is opened and if the authentication fails, the port is closed.

PreviousSecurity ProtocolsNextSOHO Routers

Last updated 3 years ago

Was this helpful?