Protocols Flashcards
What is Media Gateway Control Protocol?
Call control and communication protocol for VOIP
What is ICMP (Internet Control Message Protocol)?
A network layer protocol used by network devices to diagnose network communication issues. ICMP is mainly used to determine whether or not data is reaching its intended destination in a timely manner.
ping
tracert
What is H.323/H.264?
L5 Protocol
Used to set up, maintain, and tear down voice and video connections.
Port 1720
Explain Secure Shell (SSH)
Provides secure remote control of another machine using a text-based Environment
Port 22
Explain Secure FTP (SFTP)
Provides secure file transfer via SSH
Port 22
Explain Telnet
Provides unsecure remote control of another machine using a text-based Environment
Port 23
Explain Simple Mail Transfer Protocol (SMTP)
Provides the ability to send emails over the network.
Port 25
Explain Trivial File Transfer Protocol (TFTP)
Used as a lightweight file transfer method for sending configuration files or network booting of an OS.
Port 69
Explain Post Office Protocol Version Three (POP3).
Used for receiving incoming email.
Port 110
Explain Network Time Protocol (NTP).
Used to keep accurate time for clients on a network.
Por 123
Explain Network Basic Input/Output System (NetBIOS).
Used for file or printer sharing in a Windows network.
Port 139, 137, 138
Explain Internet Mail Application Protocol (IMAP)
A newer method of retrieving incoming emails which improves upon the older POP3.
Port 143
Explain Simple Network Management Protocol (SNMP)
Used to collect data about network devices.
Port 161, 162
Explain Lightweight Directory Access Protocol (LDAP)
Used to provide directory services to your network.
Port 389
Explain Hypertext Transfer Protocol - Secure (HTTPS)
Provides secure web browsing via TLS/SSL
Explain Server Message Block (SMB)
Used for Windows file and printer sharing services
Port 445
Explain System Logging Protocol (Syslog) use?
Used to send logging data back to a centralized server.
Explain Simple Mail Transfer Protocol Transport Layer Security (SMTP TLS)
Secure and encrypted way to send emails
Explain Lightweight Directory Access Protocol - Secure (LDAPS)
Provides Secure Directory Services
Port 636
Explain Internet Message Access Protocol over SSL (IMAP over SSL)
Secure and encrypted was to receive email
Explain Post Office Protocol Version 3 over SSL (POP3 over SSL)
Secure and encrypted way to receive email
Explain Structured Query Language Server Protocol (SQL)
Used for communication from a client to the database engine
MS
Explain SQLnet Protocol
Used for communication from a client to an Oracle database
Explain MySQL
Used for communication from a client to the MySQL database engine
Explain Remote Desktop Protocol (RDP)
Provide graphical remote control over another client or server (MS proprietary)
Port 3389
Explain Session Initiation Protocol (SIP)
Used to initiate VoIP and video calls
Port 5060, 5061
What is Real-time Transport Protocol?
L5 Protocol
Used to set up, maintain, and tear down voice and video connections.
delivering media-based data (such as VoIP) through the network
Port 5004, 5005
What is Real-Time Streaming Protocol (RTSP)?
Communicates with a media server and controls the playback of the server’s media files.
Port 554
NTP Stratum
Stratum 0 devices (including atomic and gps clocks) are the most accurate, but cannot be connected to via a network connection. A Stratum 0 device is usually used as a reference clock (or synchronisation source) for a Stratum 1 time server.
Stratum 1 devices are the most accurate ntp time sources accessible via a network connection. A Stratum 1 device would normally be synchronised via a Stratum 0 reference clock.
Stratum 2 devices are synchronised from a Stratum 1 device across a network connection. Due to network jitter and delays, Stratum 2 servers are not as accurate as Stratum 1 time servers. An NTP client synchronised from a Stratum 2 source would be a Stratum 3 device etc…
Extensible Authentication Protocol (EAP)
Allows for numerous different mechanisms of authentication.
Lightweight Directory Access Protocol (LDAP)
Validates a username and password combination against an LDAP server as a form of authentication.
Point-to-Point Protocol (PPP)
-Commonly used Layer 2 protocol on dedicated lease lines to transmit multiple Layer 3 protocols (IP, IPX)
-directly connects two network devices at the data link layer
-WAN
Password Authentication Protocol (PAP)
Performs one-way authentication between client and server
Sent in the clear
Session Initiation Protocol (SIP)
Used to setup, maintain, and tear down calls
Internet Group Management Protocol (IGMP)
*Lets routers know which interfaces have multicast receivers
*Allows clients to join a multicast group
Challenge Handshake Authentication Protocol (CHAP)
-Sends client a string of random text “challenge” which is then encrypted using a password and sent back to the server
-Performs one-way authentication using a three-way handshake.
-Hashed credentials
Extensible Authentication Protocol (EAP)
-Allows for more secure authentication methods to be used instead of just a username and a password
-Acts as a framework and transport for other authentication protocols
Gateway Load Balancing Protocol (GLBP)
Cisco’s proprietary first-hop redundancy which focuses on load balancing over redundancy
LACP
Link Aggregation Control Protocol (LACP)
-IEEE 802.3ad
-Achieves redundancy
-Multiple links between network devices
-Load balancing over multiple links
-Combines multiple connections (links) into a single logical connection to load balance