Network+ Chapter 13 Flashcards
________typically reside on routers to determine which packets are allowed to route through them based on the requesting devices’s source or destination IP.
ch 13 pg 432
Access Control Lists (ACLs)
What 4 things should you do when configuring ACLs between the internet and your private network to mitigate security problems?
Ch 13 pg 433
Deny any address from your internal networks
Deny any local host address(127.0.0.0/8)
Deny any reserved private addresses
Deny addresses in the IP multicast address range (224.0.0.0/4)
Define tunneling?
Ch 13 pg 434
Encapsulating one protocol within another to ensure that a transmission is secure.
The Network+ exam will test your understanding of the following tunneling protocols?
Ch 13 pg 434
VPNs (Virtual Private Network) SSL (Secure Socket Layer) SSL VPN (Secure Socket Layer Virtual Private Network) Layer 2 Tunneling Protocol (L2TP) Point to Point Tunneling Protocol(PPTP) Generic Routing Encapsulation(GRE) Internet Protocol Security (IPSec) ISAKMP
____________ allow remote users like telecommuters to securely access the corporate network wherever and whenever they need to.
(p. 436)
Host-to-Site (Remote-Access) VPN’s
What is one of the most common reasons why users can connect to the internet and not their office?
(p. 436)
The users don’t have the correct VPN address and password.
_________VPN allow an organization’s suppliers, partners, and customers to be connected to the corporate network in a limited way for business-to-business b2b communications.
(p. 436)
Extranet
Who created L2TP?
p. 437
Internet Engineering Task Force (IETF).
Which port does PPTP use and what is its function?
p. 438
PPTP is a VPN protocol that runs over port 1723 and allows encryption to be done at the Application (data) level.
_____________is a tunneling protocol that can encapsulate many protocols inside IP tunnels. Some examples would be routing protocols such as EIGRP and OSFP and the routed protocol IPv6.
(p. 438)
Generic Routing Encapsulation (GRE)
Which two modes does IPSec work in?
(p. 439).
transport mode and tunneling mode.
_____________defines procedures and packet formats to establish, negotiate, modify, and delete security associations
(p. 440)
Internet Security Association and Key Management Protocol (ISAKMP)
______________is a Layer 2 protocol that provides authentication, encryption, and compression services to clients logging in remotely.
(p. 446). Wiley
Point-to-Point Protocol (PPP)
_____________is an extension of PPP. Its purpose is to encapsulate PPP frames within Ethernet frames.
p. 446
Point-to-Point Protocol over Ethernet PPPoE
What has been the preferred method of encryption in the US since 2002 and has key lengths of 128,192,256 bits.
pg 447
Advanced Encryption Standard (AES)