Connection Security Flashcards
Rule Type
Specifies the basic function of the rule, such as to isolate computers based on authentication criteria, to exempt certain computers ( such as infrastructure servers) from authentication, to authenticate two specific computers or groups of computers, or to tunnel communications between two computers, as shown in Figure 19-12. You can also create custom rules combining these functions.
Endpoints
Specifies the IP addresses of the computers that establish a secured connection before transmitting any data, as shown in Figure 19-13.
Requirements
Specifies whether authentication between two computers should be requested or required. If required, options include requiring authentication for inbound connections only or for both inbound and outbound connections, as shown in Figure 19- 14.
Authentication Method
Specifies the type of authentication the computers should use when establishing a connection,