Research Article
Next-Generation Digital Forensic Readiness BYOD Framework
Table 5
The index used in Figure
3.
| Index | Description |
| 1 | Wireless LAN controller | 2 | Authentication traffic from branch to AAA server | 3 | Ethernet over IP (EoIP) tunnel between foreign controller and anchor controller | 4 | Corporate users (non-BYOD) | 5 | BYOD untrusted users | 6 | DMZ segregation firewall | 7 | Anchor controller (guest controller) | 8 | External firewall | 9 | AAA (authorization, authentication, accounting) server for BYOD authentication | 10 | Active Directory for user identity | 11 | External Internet router | 12 | Traffic logs from gateway to management server for activity logs | 13 | Management server (log management) | 14 | Traffic logs from branch to central management server | 15 | Branch external firewall | 16 | EoIP tunnel | 17 | Branch BYOD users | 18 | Branch trusted users | 19 | Branch foreign controller | 20 | Authentication traffic from branch to central site AAA server | 21 | Branch/remote location |
|
|