Chapter 06
Chapter 06
Chapter 6
Learning Objectives
Understand why authentication is a critical
aspect of network security
Describe why firewalls authenticate and
how they identify users
Describe user, client, and session
authentication
List advantages and disadvantages of
popular centralized authentication systems
continued
Learning Objectives
User authentication
Client authentication
Session authentication
User Authentication
Strength of security
Filtering characteristics
Proxy characteristics
NAT characteristics
Strength of Security
Filtering Characteristics
Proxy Characteristics
RADIUS
Doesn’t work with generic proxy systems, but a
RADIUS server can function as a proxy server
TACACS+
Works with generic proxy systems
NAT Characteristics
RADIUS
Doesn’t work with NAT
TACACS+
Should work through NAT systems
Password Security Issues
Single-password systems
One-time password systems
Certificate-based authentication
802.1x Wi-Fi authentication
Single-Password Systems
continued
Chapter Summary
Centralized authentication methods that firewalls
can use
Kerberos
TACACS+
RADIUS
Password security issues and special password
security tools
Authentication protocols used by full-featured
enterprise-level firewalls