click below
click below
Normal Size Small Size show me how
Net+ Sec Protocols
Network+ Security Protocols
Question | Answer |
---|---|
IPSec | Internet Protocol Security A suite of protocols used to encrypt data packets -Designed by IETF for secure transmissions at the IP layer |
IPSec Modes | Transport Mode -Only the data is encrypted Tunnel Mode -The entire packet, including headers, is encrypted, making this mode more secure |
L2TP | Layer 2 Tunneling Protocol -An enhanced tunneling protocol that is used in multiprotocol VPN implementations -Is optimized to work with IPv6 and IPSec -It is an extension to the PPP protocol -Operates at the Data Link Layer -defined in RFC 2661 |
SSL | Secure Sockets Layer -Enables secure communications over the Internet -Invented by Netscape -Uses a Public/Private key pair to encrypt and decrypt transmissions |
Public/Private Key system and operation process | A system used in SSL and other protocols to secure communications -The sender looks up the receiver's private key -It encrypts the data using that key -It sends the data to the receiver -The receiver decrypts the transmission using its Private key -T |
WEP | Wired Equivalent Privacy Encrypts communications between clients and wireless access points (WAPs) -Intended to simulate the physical security of a wired LAN -Uses a single, statically configured key for access control -Operates at the Physical and Da |
WPA | Wifi Protected Access Designed as an improved replacement for WEP |
WPA Advantages | -Supports Extensible Authentication Protocol (EAP) for user authentication -Supports Temporal Key Integrity Protocol (TKIP), which supports kry sdcrambling and integrity checking -Will be replaced by 802.11i when it is completed |
802.1x | An 802.11 WLAN authentication standard that uses EAP and supports user-level authentication through various methods (password, certificate, etc.) |
802.1x Authentication Process | -The supplicant (client) requests access from the authenticator (WAP) by sending an EAP start message -The authenticator sets the supplicant's client software to 'unauthorized', which prevents all traffic except for 802.1x traffic from being received -T |