Each of the protocols covered in this chapter plays an important role in securin
ID: 3898024 • Letter: E
Question
Each of the protocols covered in this chapter plays an important role in securing transmissions between remote locations. It’s important to have the big picture in mind regarding how these protocols interact with each other in various parts of the system when troubleshooting connectivity and security issues.
In this project, you will synthesize the major characteristics of each protocol into a single reference table. You can create Table 7-1 below in a word-processing program or a spreadsheet program. Then refer to the information given in this chapter to fill in the missing pieces.
Table 7-1 Notable encryption and authentication methods
Security method
Type
Primary use(s)
Notes
PPP
Connection
Remote access
GRE
Encapsulation
L2TP
Tunneling
VPN
IPsec
Encryption
VPN
SSL
TLS
Secure transmission of HTTP sessions
SSL VPN
SFTP
Encryption
File transfer
SSH
SHA
Hashing
RADIUS
Central authentication point for wireless, mobile and remote users
TACACS+
Authentication, Authorization, and Accounting (AAA)
MS-CHAPv2
Authentication
EAP
802.1x
Authentication
AES
Encryption
Wi-Fi
Kerberos
Verify the identity of clients and to securely exchange information after a client logs on to a system
Security method
Type
Primary use(s)
Notes
PPP
Connection
Remote access
GRE
Encapsulation
L2TP
Tunneling
VPN
IPsec
Encryption
VPN
SSL
TLS
Secure transmission of HTTP sessions
SSL VPN
SFTP
Encryption
File transfer
SSH
SHA
Hashing
RADIUS
Central authentication point for wireless, mobile and remote users
TACACS+
Authentication, Authorization, and Accounting (AAA)
MS-CHAPv2
Authentication
EAP
802.1x
Authentication
AES
Encryption
Wi-Fi
Kerberos
Verify the identity of clients and to securely exchange information after a client logs on to a system
Explanation / Answer
Answer)
PPP :
This is a point-to-point protocol which is in a data link layer that helps in communication protocol so as to establish a connection between the two nodes.
GRE:It is a tunneling protocol for encapsulation and has a wide variety of network layer protocol inside virtual point-to-point links. Used in IP Packeting
L2TP: This is a virtual dialup protocol which is used in user datagram protocol. Mostly used with IPsec.
IPSec: This uses the cryptographic security services so as to protect the communication over IP networks.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.