Chris Wiginton
ITT Technical Institute, Tampa FL
Instructor: David Marquez
1 May 2014
Multi-Factor Authentication Process
Area
Authentication Process(es)
Authentication Factors
Authentication and Authorization
LDAP /Kerberos Authentication, Token , Session Timeline
Username , Password
Token, Pin, Biometric
Device Support
Device should not be end of life and under support contract
Vendor Supported Firewalls using Approved Product List (APL)
Interoperability
ISO and IEEE Standards for Encryption
Multi-Vendor Interoperability based on AES, 3DES Standards, and SSL Encryption methods.
Multiprotocol Support
TCP, UDP, ESP, SSL
ACL only allows trusted endpoints based on Port and Protocol
Packet Encryption
IKE - Internet Key Exchange
VPN 2 Phase Negotiation based on Pre-Share Key, VPN Certificate Authentication.
Router Management
Out-of-Band Management
Username and Password Authentication.
Traffic
VPN and Tunnel Based Traffic
ACL and Tunnel Traffic Established Between Trusted End Points.
UDP and TCP
Protocol Enforcement with Stateful Firewall Access list
Source and Destination, Address and Session established with Layer 7 Firewall Protection.