Port 80, for example, is used for HTTP traffic. In TCP/IP networks, a port number identifies what protocol is listened for. Secure Shell can tunnel data from any TCP application with a predefined To learn more about Secure Shell protocols, authentication methods, and cryptography, refer to our Secure Shell Overview. This standard protocol employs authentication and encryption to ensure the privacy and integrity of data exchanged between clients and servers. Secure Shell (often referred to as SSH) can help to neutralize these threats and make the most of secure Internet-based remote access. Unless appropriate measures are taken, allowing remote access over the Internet can compromise usernames, passwords, proprietary data, traveler laptops, teleworker PCs - even the corporate network itself. "Always on" broadband greatly increases this exposure by giving intruders a fixed target to attack repeatedly over time. Whenever a computer is connected to the Internet, it becomes a potential target for intruders. Broadcast access technologies like cable and wireless are especially vulnerable. Sensitive data can be intercepted, modified, or replayed anywhere between remote workers and the corporate firewall. However, Internet-based remote access also adds significant risk. Leveraging the Internet to extend the local area network (LAN), provide real-time communications, and immediate file transfer and sharing is a scalable, cost-effective solution for corporate network remote access. At the same time, Internet access is now cheap, fast, and readily available. In many corporations, remote access to business applications has become mission critical. With today's increasingly mobile and distributed workforce, providing remote access to travelers and teleworkers is no longer a "nice to have" option. She lectures on virtual private networking at industry conferences and has written extensively about a wide variety of network infrastructure, access, and security technologies. Phifer has been involved in data communications, internetworking, security, and network management products for over 20 years. VanDyke Software's clients and servers provide an end-to-end tunneling solution to secure client/server applications, which may serve as a lightweight alternative to a Virtual Private Network (VPN).Ībout the Author: Lisa Phifer is vice president of Core Competence, Inc., a consulting firm specializing in network security and management technology. The benefits of port forwarding are illustrated by a series of concrete examples. A Secure Shell (SSH) capability called port forwarding allows nonsecure TCP/IP data to be tunneled across public and private networks through a secure, encrypted connection. Remote access to network resources is increasingly a business requirement, but external network threats must be neutralized.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |