Loading...

Tutorial: Implementing a Secure Network Infrastructure

16152 56________

Speakers: Merike Kaeo, None

This tutorial provides detailed technical information about security technologies that should be considered when securing any networking infrastructure. Technologies to be covered include S/Key, 802.1x, RADIUS, TACACS+, SSH, SSL, L2TP, and IPsec. We will show specific architectures and configuration examples to effectively secure network infrastructures comprising routers, switches, and firewalls. Configuration examples will be vendor-independent and will include much of the most widely deployed equipment.

The three 90-minute sessions will cover:

Security technology details

Secure infrastructure architectures

Sample configuration scenarios.

See more at: www.nanog.org/meetings/nanog29/agenda

コメント