Virtual Protocols & Authentication Flashcards
content switch
load balancer, distribute server request
content engine
cache engine, caching functions of proxy serverq
LACP
Link Aggregation Control Protocol. multiple links as single link
GLBP
Gateway Load Balancing Protocol. Load balancing over redundancy. CISCO
FHRP
First hop redundancy protocol. Redundancy with the nearest router will be new default gateway in case of failover
VRRP
Virtual Router Redundancy Protocol. Activer router and standby router. Virtual router as default gateway.
CARP
Common Address Redundancy Protocol. Active and standby router. Failover redundancy, multiple hosts on the same network share set of IP address
HSRP
Hot Standby Router Protocol. Active and standby router. virtual router as default gateway. CISCO
RADIUS
open standard udp based authentication protocol
Primarily used for network access
Combines authentication and authorization
Encrypts only the password in the access-request packet
TACACS+
TCP BASED AUTHENTICATION PROTOCOL,
Encrypts the entire payload of the access-request packet
Primarily used for device administration
Separates authentication and authorization
remote access
KERBEROS
AUTHENTICATION IN WINDOWS DOMAINS(the network all the servers computers printers everything)
used to enable SSO
unique encrypted key called a ticket.
IEEE 802.1X
permits or denies a wired or wireless client access to a LAN
PORT BASED NAC
(known as WPA2-Enterprise mode)
Uses RADIUS to connect to network with different credentials every time instead of everyone using the same user and password like at home.
MD5
Message Digest 5 128 bit hash digest. Hashing algorithm
SHA-1
Secure Hash Algorithm 1, 160 bit hash digest. Hashing Algorithm
SHA-256
Secure Hash Algorithm 256, 256-bit hash digest. Hashing Algorithm