Remote Access Flashcards

1
Q

IPSec (Internet Protocol Security)

A
  • Security for OSI Layer 3
    • Authentication and encryption for every packet
  • Confidentiality and integrity/anti-replay
    • Encryption and packet signing
  • Very standardized
    • Common to use multi-vendor implementations
  • Two core IPSec protocols
    • Authentication Header (AH)
    • Encapsulation Security Payload (ESP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SSL VPN (Secure Sockets Layer VPN)

A
SSL VPN (Secure Sockets Layer VPN)
• Uses common SSL/TLS protocol (tcp/443)
  • Avoids running into most firewall issues
  • No big VPN clients
    • Usually remote access communication

• Authenticate users
• No requirement for digital certificates or shared
passwords (like IPSec)

  • Can be run from a browser or from a light VPN client
    • Across many operating systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Site-to-Site VPNs

A
  • Encrypt traffic between sites
  • Through the public Internet
  • Use existing Internet connection
  • No additional circuits or costs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Host-to-Site VPNs

A

• Also called “remote access VPN”
• Requires software on the user device
• May be built-in to existing operating
system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DTLS VPN

A
  • Datagram Transport Layer Security
    • The security of SSL/TLS, the speed of datagrams
    • Transport using UDP instead of TCP
  • TCP brings some great features
    • Packet reordering
    • Retransmission of lost/dropped data
  • TCP sometimes gets in the way
    • Streaming, VoIP
    • When you lose a packet, it’s too late to recover it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Remote desktop access

A
  • Share a desktop from a remote location
    • It’s like you’re right there
  • RDP (Microsoft Remote Desktop Protocol)
    • Clients for Mac OS, Linux, and others as well
  • VNC (Virtual Network Computing)
    • Remote Frame Buffer (RFB) protocol
    • Clients for many operating systems

• Commonly used for technical support - and for
scammers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSH (Secure Shell)

A

• Encrypted console communication -
tcp/22
• Looks and acts the same as Telnet -
tcp/23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Web-based management console

A
  • Your browser
    • The universal client

• Manage a device from an encrypted web-based
front-end
• Connect to the HTTPS URL and login

  • The important features are in the browser
    • You may need the CLI for the detailed operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Out-of-band management

A
  • The network isn’t available
    • Or the device isn’t accessible from the network
  • Most devices have a separate management interface
    • Usually a serial connection / USB
  • Connect a modem
    • Dial-in to manage the device

• Console router / comm server
• Out-of-band access for multiple devices
• Connect to the console router, then choose where
you want to go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transferring files

A
  • FTP – File Transfer Protocol
    • Transfers files between systems
    • Authenticates with a username and password
    • Full-featured functionality (list, add, delete, etc.)
  • FTPS
    • FTP over SSL (FTP-SSL)
    • File Transfer Protocol Secure
    • This is not SFTP
• SFTP
  • SSH File Transfer Protocol
  • Provides file system functionality
  • Resuming interrupted transfers, directory listings,
     remote file removal
  • TFTP – Trivial File Transfer Protocol
    • Very simple file transfer application
    • Read files and write files
    • No authentication
    • May be used to download configurations
    • VoIP phones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly