Some authentication methods include public key authentication, one-time passwords with s/key and authentication using Kerberos (only in -portable). Strong authentication (public keys, one-time passwords) – Strong authentication protects against several security problems: IP spoofing, fakes routes and DNS spoofing.A number of different ciphers and key types are available, and legacy options are usually phased out in a reasonable amount of time. Encryption is also used to protect against spoofed packets. ![]()
0 Comments
Leave a Reply. |