Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Each of the protocols covered in this chapter plays an important role in securin

ID: 3898024 • Letter: E

Question

Each of the protocols covered in this chapter plays an important role in securing transmissions between remote locations. It’s important to have the big picture in mind regarding how these protocols interact with each other in various parts of the system when troubleshooting connectivity and security issues.

In this project, you will synthesize the major characteristics of each protocol into a single reference table. You can create Table 7-1 below in a word-processing program or a spreadsheet program. Then refer to the information given in this chapter to fill in the missing pieces.

Table 7-1         Notable encryption and authentication methods

Security method

Type

Primary use(s)

Notes

PPP

Connection

Remote access

GRE

Encapsulation

L2TP

Tunneling

VPN

IPsec

Encryption

VPN

SSL

TLS

Secure transmission of HTTP sessions

SSL VPN

SFTP

Encryption

File transfer

SSH

SHA

Hashing

RADIUS

Central authentication point for wireless, mobile and remote users

TACACS+

Authentication, Authorization, and Accounting (AAA)

MS-CHAPv2

Authentication

EAP

802.1x

Authentication

AES

Encryption

Wi-Fi

Kerberos

Verify the identity of clients and to securely exchange information after a client logs on to a system

Security method

Type

Primary use(s)

Notes

PPP

Connection

Remote access

GRE

Encapsulation

L2TP

Tunneling

VPN

IPsec

Encryption

VPN

SSL

TLS

Secure transmission of HTTP sessions

SSL VPN

SFTP

Encryption

File transfer

SSH

SHA

Hashing

RADIUS

Central authentication point for wireless, mobile and remote users

TACACS+

Authentication, Authorization, and Accounting (AAA)

MS-CHAPv2

Authentication

EAP

802.1x

Authentication

AES

Encryption

Wi-Fi

Kerberos

Verify the identity of clients and to securely exchange information after a client logs on to a system

Explanation / Answer

Answer)

PPP :

This is a point-to-point protocol which is in a data link layer that helps in communication protocol so as to establish a connection between the two nodes.

GRE:It is a tunneling protocol for encapsulation and has a wide variety of network layer protocol inside virtual point-to-point links. Used in IP Packeting

L2TP: This is a virtual dialup protocol which is used in user datagram protocol. Mostly used with IPsec.

IPSec: This uses the cryptographic security services so as to protect the communication over IP networks.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote