Remote Access Methods 3.4

¡Supera tus tareas y exámenes ahora con Quizwiz!

Console Router

A device used to provide remote access to the command-line interface of multiple switch and/or router appliances.

Telnet

A fast and efficient, but insecure way of remoting into a client.

out-of-band management

A switch management option that provides on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, in order to interface with a switch. Can also use a dial up modem to connect.

In-band management

A switch management option, such as Telnet, that uses the existing network and its protocols to interface with a switch.

HTTPS/management URL

A web based configuration interface for various types of devices.

Client-to-site VPN

Also known as a remote-access VPN, a client-to-site VPN interconnects a remote user with a site, as an alternative to dial-up or ISDN connectivity, at a reduced cost.

IPSec

Internet Protocol Security. Used to encrypt traffic on the wire and can operate in both tunnel mode and transport mode. It uses tunnel mode for VPN traffic. IPsec is built into IPv6, but can also work with IPv4 and it includes both AH and ESP. AH provides authentication and integrity, and ESP provides confidentiality, integrity, and authentication. IPsec uses port 500 for IKE with VPN connections. Layer 3 Network Protocol

RDP

Microsoft's implementation of the Remote Desktop Protocol (RDP) dates back to some of the OS's earlier releases that provided a Terminal interface that required extensive knowledge of commands. Features were added to create more effective control with each release. It is now possible to view and control the host you are connected to. VNC (Virtual Network Computing) is the open-source version of this technology allowing vendors and manufacturers to modify the app as needed.

SSH

Secure Sockets Handling (SSH) can be used to initiate console screens on routers, switches and other network devices for analysis or configuration. Consider the SSH key as a substitute for your username and password for authentication. The SSH protocol provides a secure cryptographic connection at both ends.

SSL/TLS/DTLS

These standards permit the use of standard web browsers for secure VPN communications. Secure Socket Layer, Transport Layer Security, and Datagram Transport Layer Security

Site-to-site VPN connection

Connects two private networks. Site-to-site VPN connections can be used to connect branch offices to an organization's primary site or to connect one organization to the network of another organization. This VPN connection allows routed connections to the remote site or network while helping to maintain secure communications over the Internet. When networks are connected over the Internet, a VPN-enabled router forwards packets to another VPN-enabled router across a VPN connection.

FTP/FTPS

FTP allows file transfers but is not secure. FTPS is a secure version of FTP.

VNC

In computing, Virtual Network Computing (VNC) is a graphical desktop-sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer. It transmits the keyboard and mouse input from one computer to another, relaying the graphical-screen updates, over a network.

TFTP

Trivial File Transfer Protocol. Least secure of all the FTP options. Fast transfers on local networks but not suited to Internet travel.

SFTP

Uses SSH to secure FTP transmissions.

VPN

Virtual Private Networks provide a secure, private, encrypted, host-to-host connection called a tunnel. The tunnel is established between a host and a network server in a client to site configuration or as a site to client tunnel.


Conjuntos de estudio relacionados

Accounting exam 3 multiple choice

View Set

Module 6 Review Quiz: Linux installation and configuration

View Set

Michigan Drivers Training Part 1 Segment 1

View Set

C207 - Sections 4-6 Quiz Questions

View Set

Identifying and Reporting Child Abuse and Neglect DCF

View Set

Chapter 8: Accounting for Long-Term Assests

View Set