1.4c - Other Useful Protocols

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/12

flashcard set

Earn XP

Description and Tags

Flashcards covering key networking protocols and their functions as discussed in the lecture.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

ICMP

Internet Control Message Protocol; used to check the status of devices on a network.

2
New cards

ping

A command that uses ICMP to check if a device is alive and operating on the network.

3
New cards

GRE

Generic Routing Encapsulation; a protocol used to create tunnels in VPNs.

4
New cards

VPN Concentrator

A device that provides encryption and decryption for data sent across VPN tunnels.

5
New cards

IPSec

Internet Protocol Security; a protocol used to encrypt data over VPNs.

6
New cards

AH (Authentication Header)

A protocol in IPSec that provides data integrity and authenticity.

7
New cards

ESP (Encapsulation Security Payload)

A protocol in IPSec that encrypts data and provides integrity and authentication.

8
New cards

IKE (Internet Key Exchange)

The process used to agree on encryption keys for a VPN tunnel.

9
New cards

Security Association (SA)

An agreement between two parties on the parameters of the security mechanisms used.

10
New cards

Transport Mode

An IPSec mode where only the payload of the IP packet is encrypted.

11
New cards

Tunnel Mode

An IPSec mode where the entire IP packet, including original headers, is encrypted.

12
New cards

Diffie-Hellman

A method used in phase one of IKE to generate a shared secret key.

13
New cards

ISAKMP

Internet Security Association and Key Management Protocol; part of the IKE process.