Page 12 - Security+ (635 notes by Nikkhah)
P. 12
Remote Authentication Dial-In User Service (RADIUS)
154- RADIUS is the most widely used protocol for centralized authentication of remote clients.
155- It can be used for dial-up clients, VPN, and wireless connections.
156- It provides authentication and authorization.
157- It supports use of PPP, CHAP, EAP, MS-CHAPv2, and PAP protocols.
158- It uses UDP ports 1812 and 1813.
159- RADIUS is prone to buffer overflow attacks.
Terminal Access Controller Access Control System (TACACS)
160- TACACS is used for centralized authentication in Unix environments.
161- It provides authentication and authorization.
162- TACACS uses UDP port 49.
163- TACACS+ uses TCP port 49 and provides authentication, authorization, and accounting.
164- Both TACACS and TACACS+ are prone to replay, birthday, packet-sniffing, and buffer
overflow attacks.
Point-to-Point Tunneling Protocol (PPTP)
165- PPTP is used to create secure VPN tunnels using TCP port 1723.
166- It is easy to implement and administer.
167- It works only in IP networks and does not provide encryption of authentication data.
168- Only the data transmitted after initial authentication is encrypted.
169- MMPE protocol is used for data encryption in Microsoft networks.
Layer 2 Tunneling Protocol (L2TP)
170- This combination is used for secure VPN communications and uses TCP port 1701.
171- L2TP provides computer authentication as well as user authentication.
172- When used with IPSec, it provides confidentiality, authentication, and integrity.
173- It can be used in IP, IPX, and SNA networks.
IP Security (IPSec)
174- IPSec provides secure IP communications by encrypting each IP packet.
175- The Authentication Header (AH) is used to sign each IP packet to ensure authenticity and
integrity.
www.hrnikkhah.com by : Hamid Reza Nikkhah Page 10