1/5
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The Extensible Authentication Protocol (EAP)
is an authentication framework that is commonly used for wireless networks
Challenge Handshake Authentication Protocol (CHAP)
is an authentication protocol designed to provide more security than earlier protocols like PAP. CHAP uses an encrypted challenge and three-way handshake to send credentials
802.1x
Is an IEEE standard for network access control (NAC), and it is used for authentication for devices that want to connect to a network. In 802.1x systems, supplicants send authentication requests to authenticators such as network switches, access points, or wireless controllers
Remote Authentication Dial-In User Service (RADIUS)
can operate via TCP or UDP and operates in a client-server model. RADIUS sends passwords that are obfuscated by a shared secret and MD5 hash, meaning that it’s password security is not very strong. RADIUS traffic between the RADIUS network access server and the RADIUS server is typically encrypted using IPSec tunnels or other protections to protect the traffic
Terminal Access Controller Access Control System Plus (TACACS+)
uses TCP traffic to provide authentication, authorization, and accounting services
Kerberos
is a protocol for authenticating services requests between trusted hosts across an untrusted network like the Internet