3.4 Given a scenario, use remote access methods. Flashcards
IPSec (Internet Protocol Security)
Security for OSI Layer 3
Confidentiality and integrity/anti-replay
Very standardized
Two core IPSec protocols
SSL VPN (Secure Sockets Layer VPN)
Uses common SSL/TLS protocol (tcp/443)
No big VPN clients
Authenticate users
Can be run from a browser or from a light VPN client
Site-to-Site VPNs
Encrypt traffic between sites
Through the public Internet
Use existing Internet connection
No additional circuits or costs
Host-to-Site VPNs
Also called“remote access VPN”
Requires software on the user device
DTLS VPN
Datagram Transport Layer Security
The security of SSL/TLS, the speed of datagrams
Transport using UDP instead of TCP
TCP sometimes gets in the way -Streaming, VoIP packet loss cannot be recovered
Remote desktop access
RDP (Microsoft Remote Desktop Protocol)
Share a desktop from a remote location
VNC (Virtual Network Computing) - Remote Frame Buffer (RFB) protocol
Commonly used for technical support - and for scammers
Web-based management console
Your browser - The universal client
Manage a device from an encrypted web-based front-end - HTTPS
Out-of-band management
The network isn’t available or accessible from the network
separate management interface -serial connection / USB - Modem Dial-in to manage the device
Console router / comm server
Out-of-band access for multiple devices
Connect to the console router, then choose where you want to go
Transferring files
FTP – File Transfer Protocol
FTPS - File Transfer Protocol Secure (Not SFTP)
SFTP - SSH File Transfer Protocol
TFTP – Trivial File Transfer Protocol -No authentication May be used to download configurations - VoIP phones