- 1、本文档共43页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
数据挖掘CLI331_Steve_Riley
Connecting to a wireless network All Wireless Dialup and VPN Connecting to a wireless network Connecting to a wireless network Open WEP WEP (802.1X) WPA-Personal WPA-Enterprise WPA2-Personal WPA2-Enterprise None WEP TKIP AES Connecting to a wireless network ?2006 Microsoft Corporation. All rights reserved. Windows VistaNetworkingEnhancements Steve Riley Senior Security Strategist, Security Technology Unit steriley@ /steriley CLI 331 Our network security vision The Internet is the network Logically zoned through policy Access controlled by identity and health All communications authenticated Traffic management at the edges and network attachment points Active Directory at the core Un-trusted Isolated and Trusted Unmanaged Devices Remote Access Gateway Seamless Network Provisioning Server New PC Trusted Required authentication X Infrastructure Servers Authenticating Host Firewalls Optional authentication All about the stack Protocols and core networking components Quality of service Wireless Wired 802.1X Retired features No, I will not cover NAP here. There are sessions here at TechEd and plenty of information on Microsoft’s web site. Next-generation stack architecture Performance enhancements Receive window auto-tuning (optimize receiver) Compound TCP (optimize sender) Added specifications for high-loss environments RFC 2582: NewReno mod to TCP fast recovery RFC 2883: Extension to selective ACK option RFC 3517: Conservative SACK-based loss recovery RFC 4138: Detecting spurious retransmission timeouts Improved routing path detection and recovery Neighbor unreachability detection Fail-back support after dead gateway detection Better PMTU black-hole router detection New mechanisms for NDIS offloading Receive-side scaling for multiple processors Routing compartments Windows XP/2003 Vista/Longhorn Weak end-system model(Windows XP/2003 default) DA= Strong end-system model(Windows Vista default) DA= DA= Dead gateway detection: fail-over(Windows XP/2003) D
您可能关注的文档
- 深圳公司效能监察工作和流程.doc
- 如何在课堂上利用游戏的形式进行教学?.doc
- 07-08机械设计基础试卷(第1学期)(A).doc
- NO-3(Logo设计).ppt
- 肝胆外科出科考试题.doc
- FP-TB-1操作说明书.doc
- 角平分线性质应用专题二.doc
- 第一单元社思复习提纲.doc
- 营业经理处罚条例.doc
- ME1:色彩密码.ppt
- 2025年网络文学平台版权运营模式创新与版权保护体系构建.docx
- 数字藏品市场运营策略洞察:2025年市场风险与应对策略分析.docx
- 全球新能源汽车产业政策法规与市场前景白皮书.docx
- 工业互联网平台安全标准制定:安全防护与合规性监管策略.docx
- 剧本杀剧本创作审核标准2025年优化与行业自律.docx
- 2025年新能源电动巡逻车在城市安防中的应用对城市环境的影响分析.docx
- 全渠道零售案例精选:2025年行业创新实践报告.docx
- 2025年网约车司乘纠纷处理机制优化与行业可持续发展报告.docx
- 2025年宠物烘焙食品市场法规政策解读:合规经营与风险规避.docx
- 2025年宠物行业数据安全监管政策影响分析报告.docx
文档评论(0)