CHAPTER 14: Remote Access Flashcards
Information transmitted in a continuously variable form. Phone systems are an example of an information system that uses analog data.
analog
Routines used by servers to establish the identity of a remote client attempting to connect and communicate with the server.
authentication protocols
Technology that allows user data from the corporate data center to be buffered on branch servers or workstations for local client use. Local clients can access cached data instead of retieving it over the WAN again.
BranchCache
Digital information that describes the identity of a user or computer. A user or computer can inspect the certifi cate and decide if its validity can be trusted. Certifi cates are issued by special servers called Certifi cation Authorities (CA). If a user or computer trusts a CA, then they typically trust the certifi cates issued by the CA.
certifi cate
A more secure authentication protocol than PAP. CHAP is used to periodically identify the client identity without sending the actual password over the client and server data stream. CHAP passwords are simple by design and do not support strong security methods. This presents a security risk and therefore this authentication protocol is discouraged unless the risk from communication eavesdropping is considered low.
Challenge-Handshake Authentication Protocol (CHAP)
A replacement for VPN access to corporate intranet data sources and applications utilizing bidirectional IPv6 communication with a specialized DirectAccess server. Workstations and users connect separately, allowing corporate IT administrators to manage both.
DirectAccess
A modular standard for defi ning authentication protocols that can be used to validate a computer or user. A product developer can introduce a custom authentication protocol for their product if it is not already included with Windows 7. EAP is available as an authentication standard with dial-up, VPN, and wireless connections.
Extensible Authentication Protocol (EAP)
A geographic area where a Wi-Fi wireless signal from a Wireless Access Point is available to wireless networking clients to enable network and/or Internet access.
hotspot
An application protocol commonly used to transfer TCP data in a secured session between a client and server. Because this is a common protocol used with Web servers, many fi rewalls allow this protocol to pass without blocking it.
HyperText Transport Protocol Secure (HTTPS)
A protocol designed to work together with IKEv2 to allow a host involved in a secure IKEv2 initiated SA to change its IP address, switch to a different network interface, or recover from a network outage.
IKEv2 Mobility and Multihoming Protocol (MOBIKE)
A direct, digital dial-up connection to a PSTN that operates at 64 KB per channel over regular twisted-pair cable between a subscriber and the PSTN offi ce.
Integrated Service Digital Network (ISDN)
An authentication protocol that identifi es the identity of both the client and server to each other. Once the identity of both sides is established, one or more IPSec based SAs are established between them for data transfer. IKEv2 is considered a strong authentication protocol.
Internet Key Exchange version 2 (IKEv2)
A protocol that allows a secure IP tunnel to be established with a secure HTTP connection for the purpose of transporting IPv6 packets. A IP-HTTPS client must initiate a connection to a confi gured IP-HTTPS server. The connection between client and server is not likely to be stopped by a fi rewall because the HTTPS protocol is not commonly blocked.
IP-HTTPS
A protocol that is used to secure and authenticate IP connections.
IPSec
A protocol used to carry PPP packets through IP networks.
Layer 2 Tunneling Protocol (L2TP)