What are the general steps a firewall uses to authenticate users?

What will be an ideal response?


1. The client makes a request to access a resource.
2. The firewall intercepts the request and prompts the user for name and password.
3. The user submits the requested information to the firewall.
4. The user is authenticated.
5. The request is checked against the firewall's rule base.
6. If the request matches an existing allow rule, the user is granted access.
7. The user accesses the desired resources.

Computer Science & Information Technology

You might also like to view...

Describe the differences between the set and setenv built-in commands.

What will be an ideal response?

Computer Science & Information Technology

_interstimulus interval (ISI)

What will be an ideal response?

Computer Science & Information Technology

File encryption protects data on a computer against the following except:

What will be an ideal response?

Computer Science & Information Technology

InDesign is a first-rate application for generating and editing text.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology