Security overview, Network security threats, Network security services – H3C Technologies H3C SecBlade LB Cards User Manual
Page 12: Network security technologies, Identity authentication
1
Security overview
Network security threats are happened or potential threats to data confidentiality, data integrity, data
availability or authorized usage of some resource in a network system. Network security services provide
solutions to solve or reduce those threats to different extents.
Network security threats
•
Information disclosure—Information is leaked to an unauthorized person or entity.
•
Damaging data integrity—Data integrity is damaged by unauthorized changing or destroying.
•
Denial of service—Make information or other network resources unavailable to their intended
users.
•
Unauthorized usage—Resources are used by unauthorized persons or in unauthorized ways.
Network security services
One security service is implemented by one or more network security technologies. One technology can
implement multiple services. A safe network needs the following services:
•
Identity authentication—Identifies users and determines if a user is valid. Typical ways include
AAA-based user name plus password authentication and PKI digital certificates.
•
Data security—Encrypts and decrypts data during data transferring and storing. Typical encryption
mechanisms include symmetric encryption and asymmetric encryption, and their common
applications are Secure Sockets Layer (SSL) and Secure Shell (SSH). SSL and SSH protect data
transfer based on TCP.
•
Firewall—A highly effective network security model to block unauthorized Internet access to a
protected network. Major firewall implementations are ACL based packet filter and Application
Level Gateway (ALG).
•
Attack detection and protection—Determines if traffic flows or received packets are attack packets
according to the packet contents and behaviors and, if detecting an attack, take measures to deal
with the attack for data link layer, network layer and application layer, such as TCP attack
protection.
Network security technologies
Identity authentication
AAA
AAA provides a uniform framework for implementing network access management. It provides the
following security functions:
•
Authentication—Identifies network users and determines whether the user is valid.