2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications 2008
DOI: 10.1109/ictta.2008.4530276
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of a Network Security Model using Static VLAN and AAA Server

Abstract: This paper gives the details of typical network security model using static VLAN technology and TACACS+ AAA server, also discusses security issues, and their risks, caused by different types of vulnerability, threat, attacks and misconfiguration for VLAN technology, and how prevent it and protect the network by using TACACS+ AAA server, switch and router.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0
4

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 4 publications
(1 reference statement)
0
8
0
4
Order By: Relevance
“…Keamanan memiliki satu tujuan, untuk melindungi aset. Dengan kedatangan komputer pribadi, LAN, dan dunia internet yang terbuka lebar, jaringan saat ini lebih terbuka [3].…”
Section: Pendahuluanunclassified
“…Keamanan memiliki satu tujuan, untuk melindungi aset. Dengan kedatangan komputer pribadi, LAN, dan dunia internet yang terbuka lebar, jaringan saat ini lebih terbuka [3].…”
Section: Pendahuluanunclassified
“…The intrusion detection system [14] is one of the most important inside the laboratory framework. Typically an intrusion detection system is used to monitor suspicious activity on a networked computing service by utilizing intrusion signatures.…”
Section: Monitoringmentioning
confidence: 99%
“…The proposed model in [2] provides a checklist to use in evaluating whether a network is adhering to best practices in network security and data confidentiality. However, the model aims to protect the network from vulnerabilities, threats, attacks, configuration weaknesses and security policy weaknesses.…”
Section: Related Workmentioning
confidence: 99%
“…Design and implementation of a network security model was presented in [2] using routers and firewall. Within that function, it also identified:…”
Section: Related Workmentioning
confidence: 99%