• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/38

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

38 Cards in this Set

  • Front
  • Back

Remote Networking

Enables users who are not in the same physical location to access network resources.

Remote desktop assistance

Both users have remote connection and see the same screen.

RAS servers

Combination of dial up and VPN server. Accepts multiple client connections, terminate other VPN tunnels, and route their traffic into the private network.

RADIUS

Remote authenication dial in user service. When a network contains several remote access servers, one can be RADIUS server and the rest are RADIUS clients.

Diameter

Updated version of RADIUS

AAA

Framework for controlling access to computing resources. How remote access systems permit, control, and audit remote client connections.

Remote desktop protocol RDP

Backbone of windows remote desktop system. Can encrypt, remove audio and printing, access to local files, and redirect host's disk drives and peripheral ports.

Virtual Network Computing VNC

Platform dependent desktop sharing system. Uses remote frame buffer protocol to determine best version of RFB they can support. Does not offer varying levels of encryption.

Independent computing architecture ICA

Enhances and expands on the core thin client functionality in terminal services.

X Window system

Uses a client server relationship to provide GUI and input device management functionality to applications.

Nested remote connections

When a user connected remotely to a device and that device establishes a remote connection.

Remote access protocol

Enables user to access a remote server and transfer data.

Point to point PTP

Layer 2, used to send IP diagrams over serial point to point links.

PPPoE

Feature and functionality of PPP to DSL connections that use Ethernet to transfer signals from carrier to client.

EAP

Extension of PPP and provides support for additional authenication methods.

PEAP

Secures EAP by creating encrypted channel between a remote client and server.

Multilink PPP

Provides a method for spreading traffic across multiple distinct PPP connections. Uses 2 PPP ports together.

EAP is an extension of:

PPP

Tunneling

Data transport technique in which data packet from one protocol (passenger) is transferred inside the frame or packet of another protocol (carrier).

Voluntary tunnels

Created between endpoints at the request of a client.

Compulsory tunnels

VPNs between routers. Established by routers across internet with no involvement in the part of their clients. Can be static or dynamic.

VPNs

Private network that is configured by tunneling through a public network (Internet).

Intranet VPNs

Connects sessions of a network like remote offices tying into a corporate headquarters.

Extranet VPNs

Connects networks belonging to different companies for the purpose of sharing resources.

Hardware based VPN implementation

Uses hardware such as encrypting routers.

Firewall based VPN implementation

Uses firewalls security mechanisms

Software based VPN implementation

Uses software when VPN endpoints are not controlled by the same organization.

Site to site

Each node on the network is connected to a remote network that may be separated by unsecure networks.

Host to site

VPN software must be configured on both client (host) and the server or router (site) to which the user is connecting.

Host to host

A single device makes a secure connection to another single device.

PAP

Password authenication protocol sends the client IDs and passwords as cleartext.

CHAP

Challenge handshake authenication protocol uses encryption to transmit authenication information.

TACACS+

Terminal access controller access control system plus provide centralized authenication and authorization services for remote users. Process wide encryption for authenication. Uses TCP port 49.

PPTP

Point to point tunneling protocol, layer 2, increases the security of PPP by providing tunneling and data encryption for PPP packets.

L2TP

Layer two tunneling protocol works on internet and combined the capabilities of PPTP and L2F to enable the tunneling of PPP. No encryption on it's own, uses IPsec.

Benefits of using TACACS+ over RADIUS

Uses TCP rather than UDP for kore reliable transport. It includes process wide encryption for aunthication, RADIUS encrypts only passwords.

What would you use a VPN for?

Used to give home office/travelling users access to file and email servers, and custom applications.

Do you have to use IPsec to enable a VPN?

No. IPsec is one technique for providing encrypted transmission across a public IP network.