What technologies rely on Kerberos? and How does each Firewall generation work? Solution the following are technologies that uses kerberos for the authentication. ----the digital certs and public key infrastructures uses the kerberos ----many other authentication technologies adopted kerberos. ----eample is the devices that are depends on the certs like smart cards are using kerberos. ---one-time-password schemes are also adopted to the kerberos. example : like  \"dongles\"---> which gives the unique code for every authentication task. ----and bio-metric scanners also integrated with kerberos to provide the multi-factor authentication options. 1st generation: when packets are transmit to and from the organization the first generation firewalls filters packets according to their headers. (static - packet filtering). 2nd generation: application level (Or) proxy level servers. these are differ from the router firewalls and include intermediate services 3rd generation: stateful inspection firewalls. by using state table the network communication between the internal & external devices are recll and monitor. 4th generation: dynamic packet filtering firewalls. give permissions (or) awollence to the packet which gives information about sender, receivers, and port address to communicate 5th generation: kernal proxy firewalls. these are implementeed at cisco for windows NT network. packets are evaluated at multiple layers. .