Virtual Protocols & Authentication Flashcards
content switch
load balancer, distribute server request
content engine
cache engine, caching functions of proxy serverq
LACP
Link Aggregation Control Protocol. multiple links as single link
GLBP
Gateway Load Balancing Protocol. Load balancing over redundancy. CISCO
FHRP
First hop redundancy protocol. Redundancy with the nearest router will be new default gateway in case of failover
VRRP
Virtual Router Redundancy Protocol. Activer router and standby router. Virtual router as default gateway.
CARP
Common Address Redundancy Protocol. Active and standby router. Failover redundancy, multiple hosts on the same network share set of IP address
HSRP
Hot Standby Router Protocol. Active and standby router. virtual router as default gateway. CISCO
RADIUS
open standard udp based authentication protocol
Primarily used for network access
Combines authentication and authorization
Encrypts only the password in the access-request packet
TACACS+
TCP BASED AUTHENTICATION PROTOCOL,
Encrypts the entire payload of the access-request packet
Primarily used for device administration
Separates authentication and authorization
remote access
KERBEROS
AUTHENTICATION IN WINDOWS DOMAINS(the network all the servers computers printers everything)
used to enable SSO
unique encrypted key called a ticket.
IEEE 802.1X
permits or denies a wired or wireless client access to a LAN
PORT BASED NAC
(known as WPA2-Enterprise mode)
Uses RADIUS to connect to network with different credentials every time instead of everyone using the same user and password like at home.
MD5
Message Digest 5 128 bit hash digest. Hashing algorithm
SHA-1
Secure Hash Algorithm 1, 160 bit hash digest. Hashing Algorithm
SHA-256
Secure Hash Algorithm 256, 256-bit hash digest. Hashing Algorithm
CRAMMD5
Challenge Response Authentication Mechanism Message Digest 5. Hashing algorithm used in email systems.
Naas
Network as a Service. outsource of network to a service provider
Iaas
Infrastructure as a Service. outsource of infastructure of servers or desktops to a service provider.
Saas
Software as a service. user interacts with a web based application
Paas
Platform as a Service. Dion training is an example
SIEM
Security information and event management, SIEM for short, is a solution that helps organizations detect, analyze, and respond to security threats before they harm business operations.
STP
RSTP
spanjning tree protocol (30-50s convergence time in outage)
Rapid spanning tree protocol (6s convergence time) blocking listen learn forward.