Page 12 - Security+ (635 notes by Nikkhah)
P. 12

Remote Authentication Dial-In User Service (RADIUS)
            154- RADIUS is the most widely used protocol for centralized authentication of remote clients.

            155- It can be used for dial-up clients, VPN, and wireless connections.

            156- It provides authentication and authorization.
            157- It supports use of PPP, CHAP, EAP, MS-CHAPv2, and PAP protocols.

            158- It uses UDP ports 1812 and 1813.

            159- RADIUS is prone to buffer overflow attacks.



            Terminal Access Controller Access Control System (TACACS)
            160- TACACS is used for centralized authentication in Unix environments.

            161- It provides authentication and authorization.
            162- TACACS uses UDP port 49.

            163- TACACS+ uses TCP port 49 and provides authentication, authorization, and accounting.

            164- Both TACACS and TACACS+ are prone to replay, birthday, packet-sniffing, and buffer
            overflow attacks.



            Point-to-Point Tunneling Protocol (PPTP)

            165- PPTP is used to create secure VPN tunnels using TCP port 1723.
            166- It is easy to implement and administer.

            167- It works only in IP networks and does not provide encryption of authentication data.

            168- Only the data transmitted after initial authentication is encrypted.
            169- MMPE protocol is used for data encryption in Microsoft networks.




            Layer 2 Tunneling Protocol (L2TP)
            170- This combination is used for secure VPN communications and uses TCP port 1701.

            171- L2TP provides computer authentication as well as user authentication.
            172- When used with IPSec, it provides confidentiality, authentication, and integrity.

            173- It can be used in IP, IPX, and SNA networks.



            IP Security (IPSec)

            174- IPSec provides secure IP communications by encrypting each IP packet.
            175- The Authentication Header (AH) is used to sign each IP packet to ensure authenticity and

            integrity.


                   www.hrnikkhah.com                        by :  Hamid  Reza  Nikkhah                 Page 10
   7   8   9   10   11   12   13   14   15   16   17