Network Access Control Flashcards

1
Q

What are the components of a NAC system?

A

Supplicants who are clients wishing to gain network access. Network resources, which are what the clients want access to. Network Access Servers which control access (such as DHCP, VLAN, Authentication Servers). Quarantine network, which fix clients who do not meet policy rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give three examples of Network Access Servers.

A

DHCP, VLAN, Authentication Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is EAP?

A

Extensible Authentication Protocol. It is a framework for network access and authentication protocols. It is flexible, and allows for around 40 different authentication methods. Essentially, it is a transport service for the exchange of authentication information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who performs authentication in NAC, the authenticator or the authentication server?

A

Authentication server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the message flow with EAP.

A

The authenticator detects that a client is in range, and asks them to identify themselves. The client sends back a message with its identity, which is relayed to an authentication server via the authenticator. The server will try lots of different authentication methods, until the client is either successful or fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of server is the authentication server?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Does RADIUS use TCP or UDP?

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Are RADIUS messages encapsulated in EAP messages, or are EAP messages encapsulated in RADIUS messages?

A

EAP messages are encapsulated in RADIUS messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe IEEE 802.IX

A

This is a link layer protocol, which requires authorisation before a port is assigned to an IP address. It makes use of EAPOL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who actually decides whether access should be granted to a network, the authenticator or authentication server?

A

While the authentication server does the authentication, it is actually the authenticator which grants access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the fields in an EAP message?

A

Code (tells you if the message is a request, response, success, or failure). Identifier (to match responses with requests). Length. Data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly