Information Technology Reference
In-Depth Information
AAA
AAA (triple A) provides a modular framework for configuring three security functions. The
three functions are as follows:
Authentication —Who is the user?
Authorization —What resources can be accessed?
Accounting —When was the device accessed, by whom, and what commands were used?
Security Protocols and Concepts
Table 12-9
Protocol
Description
Kerberos
A network authentication protocol
TACACS+
Terminal Access Controller Access Control System Plus; separates AAA, supports 16
privileges; encrypts full body of packet
RADIUS
Remote Authentication Dial-In User Service; only encrypts password; combines
authentication with authorization
DMZ
Demilitarized Zone
PIX
Cisco Firewall that implements Adaptive Security Algorithm (ASA) for stateful
security
CET
Cisco Encryption Technology; implements DSS, Diffie-Hellman, and DES
DES
56-bit key and 168-bit key with 3DES
DSS
Digital Signature Standard (DSS); uses a public/private key system to verify the
identity of another party and also to prove a user's own identity when communicating
through electronic means
Diffie-Hellman
For key exchange but it does not exchange the keys
Distance Vector Protocol Comparison
Table 12-10
Routing Protocol
Default Update Time (sec)
Routes Per Packet
IP RIP
30
25
IP IGRP
90
104
IPX RIP
60
50
IPX SAP
60
7
 
Search WWH ::




Custom Search