Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
38 Cards in this Set
- Front
- Back
Remote Networking |
Enables users who are not in the same physical location to access network resources. |
|
Remote desktop assistance |
Both users have remote connection and see the same screen. |
|
RAS servers |
Combination of dial up and VPN server. Accepts multiple client connections, terminate other VPN tunnels, and route their traffic into the private network. |
|
RADIUS |
Remote authenication dial in user service. When a network contains several remote access servers, one can be RADIUS server and the rest are RADIUS clients. |
|
Diameter |
Updated version of RADIUS |
|
AAA |
Framework for controlling access to computing resources. How remote access systems permit, control, and audit remote client connections. |
|
Remote desktop protocol RDP |
Backbone of windows remote desktop system. Can encrypt, remove audio and printing, access to local files, and redirect host's disk drives and peripheral ports. |
|
Virtual Network Computing VNC |
Platform dependent desktop sharing system. Uses remote frame buffer protocol to determine best version of RFB they can support. Does not offer varying levels of encryption. |
|
Independent computing architecture ICA |
Enhances and expands on the core thin client functionality in terminal services. |
|
X Window system |
Uses a client server relationship to provide GUI and input device management functionality to applications. |
|
Nested remote connections |
When a user connected remotely to a device and that device establishes a remote connection. |
|
Remote access protocol |
Enables user to access a remote server and transfer data. |
|
Point to point PTP |
Layer 2, used to send IP diagrams over serial point to point links. |
|
PPPoE |
Feature and functionality of PPP to DSL connections that use Ethernet to transfer signals from carrier to client. |
|
EAP |
Extension of PPP and provides support for additional authenication methods. |
|
PEAP |
Secures EAP by creating encrypted channel between a remote client and server. |
|
Multilink PPP |
Provides a method for spreading traffic across multiple distinct PPP connections. Uses 2 PPP ports together. |
|
EAP is an extension of: |
PPP |
|
Tunneling |
Data transport technique in which data packet from one protocol (passenger) is transferred inside the frame or packet of another protocol (carrier). |
|
Voluntary tunnels |
Created between endpoints at the request of a client. |
|
Compulsory tunnels |
VPNs between routers. Established by routers across internet with no involvement in the part of their clients. Can be static or dynamic. |
|
VPNs |
Private network that is configured by tunneling through a public network (Internet). |
|
Intranet VPNs |
Connects sessions of a network like remote offices tying into a corporate headquarters. |
|
Extranet VPNs |
Connects networks belonging to different companies for the purpose of sharing resources. |
|
Hardware based VPN implementation |
Uses hardware such as encrypting routers. |
|
Firewall based VPN implementation |
Uses firewalls security mechanisms |
|
Software based VPN implementation |
Uses software when VPN endpoints are not controlled by the same organization. |
|
Site to site |
Each node on the network is connected to a remote network that may be separated by unsecure networks. |
|
Host to site |
VPN software must be configured on both client (host) and the server or router (site) to which the user is connecting. |
|
Host to host |
A single device makes a secure connection to another single device. |
|
PAP |
Password authenication protocol sends the client IDs and passwords as cleartext. |
|
CHAP |
Challenge handshake authenication protocol uses encryption to transmit authenication information. |
|
TACACS+ |
Terminal access controller access control system plus provide centralized authenication and authorization services for remote users. Process wide encryption for authenication. Uses TCP port 49. |
|
PPTP |
Point to point tunneling protocol, layer 2, increases the security of PPP by providing tunneling and data encryption for PPP packets. |
|
L2TP |
Layer two tunneling protocol works on internet and combined the capabilities of PPTP and L2F to enable the tunneling of PPP. No encryption on it's own, uses IPsec. |
|
Benefits of using TACACS+ over RADIUS |
Uses TCP rather than UDP for kore reliable transport. It includes process wide encryption for aunthication, RADIUS encrypts only passwords. |
|
What would you use a VPN for? |
Used to give home office/travelling users access to file and email servers, and custom applications. |
|
Do you have to use IPsec to enable a VPN? |
No. IPsec is one technique for providing encrypted transmission across a public IP network. |