Remote Networking 10 Flashcards

0
Q

In remote access networking a node

A

A node uses a remote connection to connect to a network. The node can access resources and function as if it is on the same physical network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is remote networking

A

A type of networking that enables users not on the physical location to access network resources.
Uses specific protocols for connectivity
Limitations: available bandwidth, link latency and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Remote Desktop control

A

A connection mode that enables users to access any network system for the workstation and perform tasks on the remote system as if they were working locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Names some benefits of Remote Desktop Controls

A

Centralized application deployment and access
Multiple device support
Server administration and maintenance
Enhanced security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is RAS Servers

A

Remote Access Services servers are available from many sources. From Microsoft it is called RRAS Routing and Remote Access Services.

Remote access is a feature that allows an admin to access client systems from any location on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is RADIUS

A

Remote Authentication Dial-In User Service
A protocol that enables a server to provide standardized central authentication for remote users.
When a network contains several remote access servers you can configure them to be a RADIUS server and all of the others as RADIUS clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is diameter

A

An authentication protocol that is an updated version of RADIUS and improves on some of its features. Not backward compatible with RADIUS but does provide an upgrade path.
A stronger protocol but not widespread due to lack of compatible products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name the four remote control protocols

A

RDP Remote Desktop Protocol. The backbone of microsofts Remote Desktop system. Capabilities include data encryption, remote audio and printing, access to local files, and redirection of the host computers disk drives and peripheral ports

VNC Virtual Network Computing. A platform independent desktop sharing system. Uses Remote Buffering Protocol RBC Which allows the client and server to determine the best version of RFB. Not inherently secure

Independent Computing Architecture ICA. Citrix ICA protocol is a remote terminal protocol as an add on to Microsoft Terminal Services

X Window System. A protocol that uses a client-server relationship to provide GUI and input device management functionality to applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is remote access protocol

A

Enables a user to access a remote access sever and transfer data.
Can provide direct dial in connections via modems or via ISPs and the Internet.
Various ones such as PPP, PPPoE, and EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe PPP

A

Point to Point Protocol
A remote networking protocol that works on the data link layer.
Used to send IP datagrams over serial point to point links. Can be used in synchronous and asynchronous connections. Can dynamically configure and test remote network connections. Provides encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the PPP variants

A

PPPoE provides functionality of PPP to DSL connections using ethernet to transfer signals.

EAP an extension of PPP and provides support for additional authentication methods such as tokens, smart cards and certificates.

PEAP protocol that secures EAP by creating an encrypted channel between a remote client and s server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Steps to remote access authentication

A

Session initiation
Connection request
Link establishment
Authentication credentials communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe web based remote access

A

Access to services and data via web browsers. Allows clients to access web based applications and data without any additional software installed in their systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a VPN

A

A virtual private network
A private network that is configured by Tunneling through a public network like the Internet
Tunneling encapsulates and encrypts data. Need VPN protocols to ensures that connection between endpoints are secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a secure socket layer VPNs

A

SSL VPN A VPN format that works with a web browser without needing the installation of a separate client. ensures that the connection can be made only by using HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe tunneling

A

A logical path through the network that appears like a point to point connection.
A data transport technique in which a data packet from one protocol, the passenger protocol, is transferred inside the frame or packet of another protocol, the carrier protocol.
The carrier protocol can encapsulate and route nonroutable passenger protocols or it can provide additional security by hiding passenger data from the carrier networks.

16
Q

Describe the two tunnel types

A

Voluntary. Created between endpoints at the request of a client.

Compulsory. Established by a WAN carrier with no involvement with client endpoints.

17
Q

Name the three VPN types

A

Access VPNs. Provides remote access to single users via dial-up, ISDN, xDSL, or cable modem connections

Intranet VPNs. Connects sections of a network such as remote office tying into a corporate hq

Extranet VPNs. Connects networks belonging to different companies for the purpose of sharing resources.

18
Q

Name the VPN classifications by their implementations

A

Hardware based uses routers for encryption
Firewall based. Uses firewalls for security
Software based. Uses software when VPN endpoints are not controlled by the same organization

19
Q

What are the two big advantages of VPNs

A

Cost savings and data confidentiality

It’s also versatile.

20
Q

VPNs data encryption is accomplished by either MPPE or IPSec. Describe the two

A

MPPE Microsoft Point to Point Encryption. Often used with PPTP. Provides both strong, 128-bit key and standard, 40 or 56-bit key, data encryption

IPSec in tunneling used with L2TP. Data encryption using DES data encrypted standard or 3DES triple DES encryption

21
Q

What is a VPN concentrator

A

A device that incorporates advanced encryption and authentication methods to handle a large number of VPN tunnels.
Geared toward secure remote access or site to site VPNs

22
Q

List the two VPN connection Models

A

Site to site. Each node on the network is connected to a remote network that may be separated by public or other secured networks. IPSec used to ensure data transactions. Either open or closed. Open VPN the exchange of data among nodes can be unsecured. Closed VPN data can be communicated only using secure mode

Client to site. Open and closed. Open VPN the path between the end node and the IPSec gateway is not secured. Closed VPN the path between the end node and the IPSec gateway is secured.

23
Q

List some VPN protocols

A

PAP Password Authentication Protocol
CHAP Challenge Handshake Authentication Protocol
TACACS+ Terminal Access Control System Plus
PPTP Point to Point Tunneling Protocol
L2TP Layer 2 Tunneling Protocol
SSTP

24
Q

PAP is

A

Password Authentication Protocol
Is remote access authentication method that sends client IDs and passwords as cleartext. Used when a remote client is connecting to a non windows PPP server that does not support password encryption

25
Q

What is CHAP

A

the Challenge Handshake Authentication Protocol
A RAS protocol that uses an encryption method to transmit authentication information
Developed so passwords would not have to sent in plain text. Uses a combination of MD5 hashing and challenge response mechanism

26
Q

Describe the Challenge Response Authentication Process

A

The password is never sent across the network.
Client request a connection to a RAS
Server sends the challenge sequence
Client encrypts the challenge sequence
Server encrypts the challenge sequence and compares the results.

27
Q

What is TACACS +

A

Terminal Access Controller Access Control System plus
Ciscos product. Uses TCP port 49
Protocols that provide centralized authentication and authorization services for remote users.
Process wide encryption
supports Multiple protocols
More secure and scalable than RADIUS Because it accepts login requests and authenticates the access credentials of the user.

28
Q

What is PPTP

A

Point to Point Tunneling Protocol
A layer 2 Microsoft VPN protocol that increase the security of PPP by providing tunneling and data encryption for PPP packets.
Deployed over public unsecured networks like the Internet it encapsulates and transports multiprotocol data traffic over IP networks

29
Q

What is L2TP

A

Layer 2 Tunneling Protocol
Works on the Internet and combines the capabilities of PPTP and Layer 2 Forwarding L2F to enable the tunneling of PPP sessions across network protocols. Specifically designed for client to gateway and gateway to gateway connections.
Uses IPSec for encryption

30
Q

What is SSTP

A

Secure Socket Tunneling Protocol
Uses the HTTP over SSL protocol
Encapsulates a data packet from IP with an SSTP header encrypted by SSL
An IP header containing the destination address is then added to the packet.