Research Article

Next-Generation Digital Forensic Readiness BYOD Framework

Table 5

The index used in Figure 3.

IndexDescription

1Wireless LAN controller
2Authentication traffic from branch to AAA server
3Ethernet over IP (EoIP) tunnel between foreign controller and anchor controller
4Corporate users (non-BYOD)
5BYOD untrusted users
6DMZ segregation firewall
7Anchor controller (guest controller)
8External firewall
9AAA (authorization, authentication, accounting) server for BYOD authentication
10Active Directory for user identity
11External Internet router
12Traffic logs from gateway to management server for activity logs
13Management server (log management)
14Traffic logs from branch to central management server
15Branch external firewall
16EoIP tunnel
17Branch BYOD users
18Branch trusted users
19Branch foreign controller
20Authentication traffic from branch to central site AAA server
21Branch/remote location