GCGA Ch. 4 Using VPNs for Remote Access Flashcards

(11 cards)

1
Q

VPN

A

Virtual private network - provides access to private networks via a public network, such as the Internet. IPsec is a common tunneling protocol used with VPNs, and it secures traffic within a tunnel. IPsec provides authentication and integrity with an Authentication Header (AH). Encapsulating Security Payload (ESP) encrypts VPN traffic and provides confidentiality, integrity, and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IPsec Tunnel mode

A

encrypts the entire IP packet used in the internal network. Ipsec Transport mode only encrypts the payload and is commonly used in private networks, but not with VPNs. A full tunnel encrypts all traffic after a user has connected to a VPN. A split tunnel only encrypts traffic destined for the VPN’s private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Site-to-site VPNs

A

provide secure access between two networks. These can be on-demand VPNs or always- on VPNs. Mobile devices can also use always-on VPNs to protect traffic when users connect to public hotspots. Other protocols used with VPNs include TLS, L2TP, and HTML5.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NAC

A

Network access control (NAC) inspects clients for specific health conditions such as up-to-date antivirus software, and can redirect unhealthy clients to a remediation network. A permanent NAC agent (sometimes called a persistent NAC agent) is installed on the client and stays on the client. A dissolvable NAC agent is downloaded and run on the client when the client logs on and is deleted after the session ends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Agentless NAC system

A

will scan systems remotely instead of installing an agent on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Remote access authentication

A

used when a user accesses a private network from a remote location, such as with a VPN connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PAP

A

Password Authentication Protocol - uses a password or PIN for authentication. A significant weakness is that PAP sends passwords across a network in cleartext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CHAP

A

Challenge Handshake Authentication Protocol - more secure than PAP and uses a handshake process when authenticating clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RADIUS

A

Remote Authentication Dial-In User Service - provides central authentication for multiple remote access services. RADIUS relies on the use of shared secrets and only encrypts the password during the authentication process, by default. It can be used with EAP to encrypt the entire session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cisco TACACS+

A

Terminal Access Controller Access Control System Plus - used as an alternative to RADIUS. TACACS+ uses TCP, encrypts the entire authentication process, and supports multiple challenges and responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AAA protocols

A

RADIUS and TACACS+ are authentication, authorization, and accounting (AAA) protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly