
Tutorial: Implementing a Secure Network Infrastructure
16152
56________
Speakers: Merike Kaeo, None
This tutorial provides detailed technical information about security technologies that should be considered when securing any networking infrastructure. Technologies to be covered include S/Key, 802.1x, RADIUS, TACACS+, SSH, SSL, L2TP, and IPsec. We will show specific architectures and configuration examples to effectively secure network infrastructures comprising routers, switches, and firewalls. Configuration examples will be vendor-independent and will include much of the most widely deployed equipment.
The three 90-minute sessions will cover:
Security technology details
Secure infrastructure architectures
Sample configuration scenarios.
See more at: www.nanog.org/meetings/nanog29/agenda
コメント