chapter 4 part 2 Flashcards
what is 802.1x?
Port-Based Access Control:
Ethernet security- if a device connects to a port on a switch then the switch is the Gateway and communicates with a server to figure out if the user is legit.
Central authentication server?
a server on the LAN that works with the switch gateway ports and associated devices connected- this server asks for passwords for each device (supplicant) before allowing said device to communicate on the network.
what is the benefit of using a Server (Radius) instead of using a switch as a gateway and authentication on a network?
reduces cost b/c each switch on the network would need to have high processing power and need to be configured with authentication information.
- consistency b/c one database is checked for any connection and this reduces security issues b/c if many databases then one could be mis-configured.
- Immediate changes since just one database is used.
EAP?
Extensible Authentication Protocol
what is the EAP operation?
EAP - Extensible Authentication Protocol:
step 1: EAP start sent to server from switch,
2: server sends EAP request to client (smart card),
3: client responds negative to smart card,
4: EAP Request with MS-CHAP from server to device
5: Supplicant (Device) responds with MS-CHAP response string.
6: Server sends back success EAP to device but goes to switch (Gateway) first and the switch decides how to authenticate the user.
pass-through operation?
when a switch on a LAN passes EAP: Extensible Authentication Protocol information from a server to a supplicant (device on LAN).
Extensibility?
EAP Extensible Authentication Protocol: is Extensible b/c it is able to add new protocols without changing the overall structure of the EAP and no updates are needed to old EAP 802.1x switches. saves $
what is Radius?
a client/ server Protocol used by 802.1x Authentication servers. Also: authenticated users, restricts access and what specific users can/ can not do to files. *works with EAP
if a network is OPEN or if a network if not encrypted/ does not use security/// are both types for anyone to access?
if a network is marked as open then yes anyone can get on it, but if a network does not have security on it then no, only users that have permission can access it.
RFMON?
Radio Frequency Monitoring: a chipset on a client must have this ability if they want to use a sniffer program on wireless networks.
Pomiscuous mode?
a wireless card that is set up in this mode allows an attacker to receive packets that are intended for other wireless users.
whaling>?
focusing attacks on high value targets like CEO’s
Evil twin access point?
a computer that has software on it so it can act like a wireless access point and do a man in the middle attack
how can a DOS attack work on a wireless network?
use CTS/RTS frames. these frames tell the other wireless clients to wait while a message is being transmitted. this causes denial of service to other users.
how does 802.11i work and what is it?
same as 802.1x but over wifi:
*uses a digital certificate between the client and the AP (Outer authentication)- access Point. this is an additional layer of security since wireless signals can be intercepted. then the frames use the EAP to communicate with the Radius server. (inner Authentication)
what is EAP-TLS?
EAP-TLS: supplicant needs a digital certificate- expensive.
- PEAP: Protective EAP: any lvl of authentication can be selected.
- *both used as extended EAP for wireless EAP or 802.11i