Skip to content
Permalink
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
22 lines (14 sloc) 1.27 KB

Chapter 18. Security: EAP, IPsec, TLS, DNSSEC, and DKIM

Introduction

Basic Principles of Information Security

Threats to Network Communication

Basic Cryptography and Security Mechanisms

Certificates, Certificate Authorities (CAs), and PKIs

TCP/IP Security Protocols and Layering

Network Access Control: 802.1X, 802.1AE, EAP, and PANA

Layer 3 IP Security (IPsec)

Transport Layer Security (TLS and DTLS)

TLS 1.2

TLS Record Protocol
TLS Handshaking Protocols

The normal TLS connection initiation exchange consists of several messages that may be pipelined. Required messages have solid arrows and are shown in boldface type. An abbreviated exchange takes place if a previously existing connection can be restarted. This avoids endpoint authentication, which can be costly for systems with limited processing capabilities.

You can’t perform that action at this time.