O'Reilly logo

Optical Networking Systems IP Management Solutions by Randy Zhang

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Security Options

Chapter 1, “Introduction,” introduced repeater mode, the default port wiring method on the controller card. With this mode, traffic from one port cannot be separated from another port. With TCC2P and release 5.0, another wiring mode, secure mode, is available. Secure mode provides a hardware-level restriction for LAN traffic flows. This chapter provides general information on secure mode, with examples shown in Chapter 9, “Case Studies.”

Beyond the physical separation of traffic flows, access security and authentication are discussed in this chapter at the user and application levels. The subject of SOCKS Proxy is discussed again in this chapter from the perspectives of firewall and network address translation (NAT). ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required