This article will explain how to authenticate users on a Linux machine using a RADIUS server for central authentication. In this particular example, RADIUS is being used to authenticate users in RSA Authentication Manager for two-factor authentication, specifically local for ssh and console logins.
An example of putting together a solution using simple tools for analyzing log data from a Checkpoint firewall. In this example, we take a 5Gb logfile and import only data for a single host into a sqlite database. From there, we run queries to determine what communication goes through the firewall either sourced or destined to this host.
Using Department of Defense security material that is freely available to anyone in order to secure your networks and host platforms
This article describes how to secure a Cisco device before putting into production.
Dynamips is a very innovative and widely successful project geared toward the network professional for use as a highly effective training platform. This hardware emulation software should also have you taking another look at the security on your network.
Using private vlans to secure hosts on the same subnet from communicating with each other. This scenerio is desirable in places such as DMZ networks, where non-related hosts need to be secured behind a common firewall interface.
Learn the basic usage of Cisco access lists to secure a host on the network.
Enabling ssh on a Cisco device without using or enabling AAA.
Put controls in place to combat against end users putting desktop switches on the end of an ethernet connection to increase number of ports available.
Use the local router database to authenticate and assign privilege levels to users