Question
Each of the protocols covered in this chapter plays an important role in securing transmissions between remote locations. Its important to have the big picture
Each of the protocols covered in this chapter plays an important role in securing transmissions between remote locations. Its important to have the big picture in mind regarding how these protocols interact with each other in various parts of the system when troubleshooting connectivity and security issues.
In this project, you will synthesize the major characteristics of each protocol into a single reference table. You can create Table 7-1 below in a word-processing program or a spreadsheet program. Then refer to the information given in this chapter to fill in the missing pieces.
Table 7-1 Notable encryption and authentication methods
Security method | Type | Primary use(s) | Notes |
PPP | Connection | Remote access |
|
GRE | Encapsulation |
|
|
L2TP | Tunneling | VPN |
|
IPsec | Encryption | VPN |
|
SSL |
|
|
|
TLS |
|
| Secure transmission of HTTP sessions |
SSL VPN |
|
|
|
SFTP | Encryption | File transfer |
|
SSH |
|
|
|
SHA | Hashing |
|
|
RADIUS |
|
| Central authentication point for wireless, mobile and remote users |
TACACS+ | Authentication, Authorization, and Accounting (AAA) |
|
|
MS-CHAPv2 | Authentication |
|
|
EAP |
|
|
|
802.1x | Authentication |
|
|
AES | Encryption | Wi-Fi |
|
Kerberos |
|
| Verify the identity of clients and to securely exchange information after a client logs on to a system |
Step by Step Solution
There are 3 Steps involved in it
Step: 1

Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2

Step: 3

Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started