Multilayer switches
• A switch (Layer 2) and router (Layer 3) in the same
physical device
• Layer 2 router?
• Switching still operates at OSI Layer 2, routing still
operates at OSI Layer 3
• There’s nothing new or special happening here
Wireless networks everywhere
• Wireless networking is pervasive
• And you probably don’t just have a single access
point
• Your access points may not even be in the same
building
• One (or more) at every remote site
Wireless LAN controllers
Balancing the load
Load balancer
IDS and IPS
• Intrusion Detection System / Intrusion Prevention
System
• Watch network traffic
• Intrusions
• Exploits against operating systems, applications, etc.
• Buffer overflows, cross-site scripting, other
vulnerabilities
Identification technologies
Proxies
• Sits between the users and the external network
• Receives the user requests and sends the request
on their behalf (the proxy)
• Useful for caching information, access control,
URL filtering, content scanning
• Applications may need to know how to
use the proxy (explicit)
• Some proxies are invisible (transparent)
Application proxies
VPN concentrator
Remote access VPN
AAA framework
• Authorization
• Based on your identification and authentication,
what access do you have?
• Accounting
• Resources used: Login time, data sent and received,
logout time
RADIUS (Remote Authentication Dial-in User Service)
• One of the more common AAA protocols
• Supported on a wide variety of platforms and
devices
• RADIUS services available on almost any server operating system
UTM / All-in-one security appliance
Unified Threat Management (UTM) / Web security gateway • URL filter / Content inspection • Malware inspection • Spam filter • CSU/DSU • Router, Switch • Firewall • IDS/IPS • Bandwidth shaper • VPN endpoint
Next-generation Firewalls (NGFW)
• Requires some advanced decodes
• Every packet must be analyzed, categorized,
and a security decision determined
VoIP technologies
• VoIP PBX
• Integrate VoIP devices with a corporate phone
switch
• VoIP Gateway
• Convert between VoIP protocols and
traditional PSTN protocols
• Often built-in to the VoIP PBX
Content filtering