Tài liệu Bài giảng Network+ Certification - Chapter 13, Network Security: Chapter 13, Network Security 
|1| Chapter Overview 
 A. Password Protection 
 B. Security Models 
 C. Firewalls 
 D. Security Protocols 
Chapter 13, Lesson 1 
Password Protection 
|2| 1. Using Passwords 
 A. Passwords are the most common method of securing network 
resources. 
 B. There are security mechanisms other than passwords. 
 1. Smart cards 
 a. Credit card-like devices with a magnetic strip 
 b. Must be run through a card reader connected to a computer for a user 
to access the network 
 2. Biometric devices 
 a. Identify users by scanning unique physical characteristics, such as 
thumbprints or retina patterns 
 C. Passwords can be an effective security mechanism, or they can be 
useless, depending on how they are used. 
 1. The strength of any password protection is based on the password 
policies that administrators set. 
 2. When users create their own passwords, they tend to choose short, 
simple ones, or use information that is easy to guess, such...
                
              
                                            
                                
            
 
            
                 15 trang
15 trang | 
Chia sẻ: honghanh66 | Lượt xem: 995 | Lượt tải: 0 
              
            Bạn đang xem nội dung tài liệu Bài giảng Network+ Certification - Chapter 13, Network Security, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
Chapter 13, Network Security 
|1| Chapter Overview 
 A. Password Protection 
 B. Security Models 
 C. Firewalls 
 D. Security Protocols 
Chapter 13, Lesson 1 
Password Protection 
|2| 1. Using Passwords 
 A. Passwords are the most common method of securing network 
resources. 
 B. There are security mechanisms other than passwords. 
 1. Smart cards 
 a. Credit card-like devices with a magnetic strip 
 b. Must be run through a card reader connected to a computer for a user 
to access the network 
 2. Biometric devices 
 a. Identify users by scanning unique physical characteristics, such as 
thumbprints or retina patterns 
 C. Passwords can be an effective security mechanism, or they can be 
useless, depending on how they are used. 
 1. The strength of any password protection is based on the password 
policies that administrators set. 
 2. When users create their own passwords, they tend to choose short, 
simple ones, or use information that is easy to guess, such as birthdays 
or initials, or they use no password at all. 
 3. Assigning complex passwords to users can be equally ineffective, 
because the users might be compelled to write them down and leave 
them in obvious places. 
 4. The object is to find a middle ground between these two extremes. 
 D. Most operating systems include tools that enable administrators to 
impose password policies on users. 
 1. Users can be forced to 
 a. Choose passwords of a specific length 
 b. Change passwords at regular intervals 
 2. These tools provide a middle ground that lets users choose effective 
passwords that they can remember easily. 
 3. Password policies are typically available in network operating systems 
that use a directory service to authenticate users and grant them access to 
network resources. 
 a. You can set password policies on Windows 2000 and Microsoft 
Windows NT domain controllers and Novell NetWare servers. 
2 Outline, Chapter 13 
 Network+ Certification, Second Edition 
 b. You cannot set password policies in Microsoft Windows Me, 
Microsoft Windows 98, or Microsoft Windows 95. 
|3| 2. User Account Password Settings 
 A. When you create a new user account in Windows 2000 or Windows NT, 
you can use the following check boxes in the New Object – User dialog 
box to control the basic password policies for the account: 
 1. User Must Change Password At Next Logon. Allows the administrator 
to assign the same password to each new user account created and forces 
the user to change that password during the first logon 
 a. The administrator can password-protect the new accounts without 
having to track individual password assignments. 
 2. User Cannot Change Password. Prevents users from changing the 
password assigned to the account during its creation 
 a. If an administrator elects to assign passwords to users, activating this 
option on all accounts ensures that he or she retains control over the 
password assignments. 
 3. Password Never Expires. Overrides other policies that cause passwords 
to expire after a specified time 
 a. Users can still change their passwords at will, but they are not 
required to do so. 
 4. Account Is Disabled. Allows the administrator to temporarily prevent 
access to an account, eliminating the need to delete and re-create the 
account 
 3. Specifying Password Lengths 
 A. Users tend to choose short passwords, because they are easier to type 
and remember, or use no password at all. 
 1. Short passwords are mathematically easier to guess. 
 B. Most network operating systems let the administrator set a minimum 
password length requirement. 
 1. Longer passwords are harder to penetrate. 
 2. Windows 2000 supports passwords of up to 104 characters. 
 3. Windows NT supports passwords of up to 14 characters. 
 4. For most networks, a minimum password length of five or six characters 
is sufficient. 
 a. Higher security might call for eight characters or more. 
 C. In Windows 2000, you set password length restrictions by using the 
Group Policy feature. 
|4| 1. You can apply policies to domains, sites, or organizational units. 
|5| 2. When you activate the Minimum Password Length policy, you specify 
the minimum number of password characters by using the Security 
Policy Setting dialog box. 
Outline, Chapter 13 3 
Network+ Certification, Second Edition 
 4. Setting Password Change Intervals 
 A. Passwords should be changed regularly. 
 B. Administrators can set a policy that forces users to change their 
passwords at specified intervals. 
 1. Typically, the user sees an extra dialog box when logging on after the 
change interval has expired. 
 a. The dialog box forces the user to specify a new password before 
being granted access to the network. 
 2. Some administrators assign an initial password to an account to keep it 
secure and then force users to change that password during their first 
logon. 
|6| C. Windows 2000 has a Group Policy called Maximum Password Age that 
forces users to change their passwords at intervals of a specified 
number of days. 
 D. Some users try to circumvent this policy by changing their passwords 
and then immediately changing them back again. 
 1. The following additional policies in the Windows 2000 Local Security 
Policy console can be used to prevent this: 
 a. Enforce Password History. Allows you to specify the number of 
previous passwords that the operating system remembers for each 
user 
 (1) When users change their passwords as required by the 
Maximum Password Age policy, they cannot reuse any of the 
previous passwords stored in the history. 
 b. Minimum Password Age. Forces users to wait a specified number of 
days after changing their passwords before they can change them 
again 
 (1) This prevents users from rapidly changing their passwords 
several times in a few minutes in an attempt to outmaneuver 
the history feature. 
 5. Enforcing Password Complexity 
 A. Complex passwords are more difficult for intruders to guess. 
 B. In most operating systems, passwords are case-sensitive. 
 C. Mixing cases is a good way to make passwords more complex. 
 1. Example: FluFFy is a much better password than fluffy. 
 D. Adding numbers and symbols to passwords makes them even more 
complex. 
 1. Example: FluFFy_9 is a better password than FluFFy. 
 2. Another technique is to take a sentence and use the first letter of each 
word to form a password, converting some words to numbers in the 
process. 
 a. Example: the sentence “I eat fish for dinner every Friday” can 
become Ief4deF, a password that is extremely difficult to guess. 
4 Outline, Chapter 13 
 Network+ Certification, Second Edition 
|7| E. Windows 2000 and Windows NT have a Passwords Must Meet 
Complexity Requirements policy that can be used to compel users to 
select complex passwords. 
 1. In Windows, a complex password is one that meets all of the following 
criteria: 
 a. The password must contain at least six characters. 
 b. The password cannot contain any part of the account’s user name. 
 (1) Example: the password for an account with the name abaldwin 
cannot be abaldwin or contain baldwin, bald, and so forth. 
 c. The password must include three of the following four character 
types: uppercase letters, lowercase letters, numerals, and symbols. 
 2. To use this policy in Windows NT, you must install the password filter 
module (PASSFILT.DLL). 
 6. Controlling Password Encryption 
 A. Most operating systems store user passwords in encrypted form. 
 B. The encryption algorithm used on the passwords in a Windows 2000 
system is not reversible, by default. 
 C. You can modify the default by enabling the Store Password Using 
Reversible Encryption For All Users In The Domain policy. 
 1. This causes the system to use an encryption method that can be reversed 
to recover forgotten passwords. 
 7. Setting Account Lockout Policies 
 A. The brute force method of penetrating passwords is to keep guessing at 
the password until you discover it. 
 B. An account lockout policy limits the number of password attempts a 
user is allowed. 
|8| C. Windows 2000 has three account lockout policies: 
1. Account Lockout Duration. Specifies how long (in minutes) accounts 
should remain locked when the user exceeds the account lockout 
threshold 
 a. Setting the value of this policy to 0 causes accounts to remain locked 
out until an administrator manually releases them. 
2. Account Lockout Threshold. Specifies the number of logon attempts 
that users are allowed before their accounts are locked 
 a. When the account is locked, no future logon attempts are permitted 
until the account is reset. 
 b. Typographic errors, improper case, or forgotten passwords are 
common, so you should generally permit users at least three tries 
before locking the account. 
 c. A value of 0 disables the lockout function. 
3. Reset Account Lockout Counter After. Causes the failed logon counter 
to reset after a specified amount of time (in minutes) 
 a. When a user logs on successfully, the failed logon counter is reset. 
Outline, Chapter 13 5 
Network+ Certification, Second Edition 
 b. If the user does not log on successfully, the counter that registers the 
number of failed logon attempts remains in place until this policy 
resets the counter. 
Chapter 13, Lesson 2 
Security Models 
 1. Client/Server and Peer-to-Peer Networks 
 A. The primary difference between client/server networks and peer-to-peer 
networks is the security models they use. 
|9| B. Client/server networks 
 1. User accounts are stored in a central location. 
 2. A user logs on to the network from a computer that transmits the user 
name and password to a server, which either grants or denies access to 
the network. 
 3. Account information can be stored in a centralized directory service or 
on individual servers. 
4. A directory service, such as the Windows 2000 Active Directory service 
or the Novell Directory Services (NDS), provides authentication services 
for an entire network. 
 a. A user logs on once and the directory service grants access to shared 
resources anywhere on the network. 
|10| C. Peer-to-peer networks 
 1. Each computer maintains its own security information and performs its 
own authentications. 
 2. Computers on this type of network can function as both clients and 
servers. 
 3. When a computer functioning as a client attempts to use resources 
(called shares) on another computer that is functioning as a server, the 
server itself authenticates the client before granting it access. 
 D. The two basic security models used by Windows and most other 
operating systems are called user-level security and share-level 
security. 
 2. User-Level Security 
 A. Based on individual accounts created for specific users 
 1. When you want to grant users permission to access resources on a 
specific computer, you select the users from a list of user accounts and 
specify the permissions you want to grant them. 
|11| a. In Windows 2000, you use a Permissions dialog box to assign 
permissions to specific users. 
 2. Windows 2000 and Windows NT always use user-level security, 
whether they are operating in client/server or peer-to-peer mode. 
|12| B. In peer-to-peer mode, each computer has its own user accounts. 
 1. When users log on to their computers, they are authenticated against an 
account on that system. 
6 Outline, Chapter 13 
 Network+ Certification, Second Edition 
 2. If several people use the same computer, each must have a separate user 
account (or they must share a single account). 
 3. When users elsewhere on the network attempt to access server resources 
on that computer, they are also authenticated against the accounts on the 
computer that hosts the resources. 
 4. Example: 
 a. Mark Lee must have an account (mlee) on his own computer to log 
on to it. 
 b. To access other network resources, there must be an mlee account on 
each computer that he wants to access. 
 c. If Mark attempts to access a network-attached computer on which 
there is no mlee account, he is prompted to supply the name and 
password of an account on that computer. 
 d. If there is an mlee account on the network-attached computer, but 
with a different password, Mark is prompted to supply the correct 
password for that account. 
 5. The user-level, peer-to-peer security model is suitable only for relatively 
small networks because users must have separate accounts on every 
computer they want to access. 
 a. If users want to change their account passwords, they must change 
them on every computer on which they have an account. 
 6. In this model, users typically maintain the accounts on their computers 
themselves. 
 a. It would be impractical for an administrator to travel to each 
computer and create a new account for each new user. 
|13| C. On a client/server network, user-level security is easier to administer 
and can support networks of almost any size. 
 1. Administrators create user accounts in a directory service, such as 
Active Directory in Windows 2000 or a Windows NT domain. 
 2. When users log on to their computers, the directory service authenticates 
them. 
 a. The computer sends the account name and password supplied by the 
user to a domain controller, where the directory service information 
is stored. 
 b. The domain controller then checks the credentials and indicates to the 
computer whether the authentication has succeeded or failed. 
 3. When you want to allow other network users to gain access to resources 
on your computer, you select their user accounts from a list provided by 
the domain controller. 
 4. With all accounts stored in a centralized directory service, administrators 
and users can make changes more easily. 
 3. Share-Level Security 
|14| A. Windows Me, Windows 98, and Windows 95 cannot maintain their own 
user accounts. 
 1. These operating systems can employ user-level security only when they 
are participating in an Active Directory or Windows NT domain. 
Outline, Chapter 13 7 
Network+ Certification, Second Edition 
 B. In peer-to-peer mode, Windows Me, Windows 98, and Windows 95 
operate by using share-level security. 
 1. In share-level security, users assign passwords to the individual shares 
they create on their computers. 
 2. When network users want to access a share on another computer, they 
must supply the appropriate password. 
 3. The share passwords are stored on the individual computers. 
 4. When sharing drives, users can specify two different passwords to 
provide both read-only access and full control of the share. 
 5. Disadvantages of share-level security 
 a. It is not as flexible as user-level security. 
 b. It does not provide as much protection as user-level security. 
 (1) Because everyone uses the same password to access a shared 
resource, it is difficult to keep the passwords secure. 
 c. Changing a password means informing everyone who might have to 
use that resource. 
 6. The advantage of share-level security is that even unsophisticated users 
can learn to set up and maintain their own share passwords. 
 a. This eliminates the need for constant attention from a network 
administrator. 
Chapter 13, Lesson 3 
Firewalls 
|16| 1. What Is a Firewall? 
 A. A firewall is a hardware or software product designed to protect a 
network from unauthorized access by outside parties. 
 1. Networks that are connected to the Internet must have some sort of 
firewall to protect them from Internet intruders. 
 2. Firewalls can also protect one section of the network from the rest of the 
network. 
 B. A firewall is a barrier between two networks that evaluates all incoming 
or outgoing traffic to determine whether it should be permitted to pass 
to the other network. 
 1. Firewalls can be 
 a. Dedicated hardware devices (essentially routers with additional 
software that monitors incoming and outgoing traffic) 
 b. Software products that run on a standard computer 
 2. At one time, all firewalls were complex, extremely expensive, and used 
only in professional network installations. 
 a. Today, there are also inexpensive firewall software products designed 
to protect a small network or even an individual computer from 
unauthorized access through an Internet connection. 
|17| 2. Packet Filtering 
 A. The most basic type of firewall 
8 Outline, Chapter 13 
 Network+ Certification, Second Edition 
 B. Functions 
 1. Examines arriving packets 
 2. Decides whether to allow the packets access to the network, based on the 
information found in the protocol headers used to construct the packets 
 C. Packet filtering can occur at several layers of the Open Systems 
Interconnection (OSI) reference model. 
 characteristics: 
 1. Hardware addresses 
 a. Packet filtering based on hardware addresses enables only certain 
computers to transmit data to the network. 
 b. Not used to protect networks from unauthorized Internet access 
 c. Use this technique in an internal firewall to permit only specific 
computers to access a particular network. 
 2. IP addresses 
 a. Permit only traffic destined to or originating from specific addresses 
to pass through to the network 
 b. If you have a public Web server on your network, you can configure 
a firewall to admit only the Internet traffic that is destined for that 
server’s IP address. 
 (1) Prevents Internet users from accessing any of the other 
computers on the network 
 3. Protocol identifiers 
 a. Filter packets based on the protocol that generated the information 
carried within an IP datagram, such as the Transmission Control 
Protocol (TCP), the User Datagram Protocol (UDP), or the Internet 
Control Message Protocol (ICMP) 
 4. Port numbers 
 a. Filter packets based on the source or destination port number 
specified in a packet’s transport layer protocol header 
 (1) Called service-dependent filtering 
 b. Port numbers identify the application or service that generated the 
packet or service that the packet is destined for. 
 c. You can configure a firewall to permit network users to access the 
Internet using ports 110 and 25 (the well-known port numbers used 
for incoming and outgoing e-mail) but deny them Internet access 
using port 80 (the port number used to access Web servers). 
 E. The strength of the protection provided by packet filtering is its ability to 
combine the various types of filters. 
 1. Example: you might want to permit Telnet traffic into your network 
from the Internet, so that network support personnel can remotely 
administer certain computers. 
 a. However, leaving port 23 (the Telnet port) open to all Internet users 
is a potentially disastrous security breach. 
 b. Therefore, you can combine the port number filter with an IP address 
filter to permit only certain computers (those of the network 
administrators) to access the network using the Telnet port. 
Outline, Chapter 13 9 
Network+ Certification, Second Edition 
 F. Packet filtering capabilities are usually provided with a standard router. 
 1. Windows 2000 includes its own basic packet filtering mechanism. 
 G. Packet filtering usually does not have a major effect on the router’s 
throughput, unless you create a large number of filtering rules. 
 1. The router must process each packet individually against the filtering 
rules you create, so a very complex system of filters can conceivably 
slow the network down. 
 H. The main drawback of packet filtering is that it requires a detailed 
understanding of TCP/IP communications and the techniques that 
potential intruders use. 
 1. You must be ready to modify your filters to counteract new techniques 
developed by intruders. 
|19| 3. NAT 
 A. NAT is the acronym for network address translation. 
 B. A network layer technique that protects the computers on your network 
from Internet intruders by masking their IP addresses 
 1. If you connect a network to the Internet without firewall protection, you 
must use registered IP addresses. 
 a. Registered IP addresses are visible from the Internet. 
 b. Any user on the Internet can access your network’s computers and 
their resources. 
 C. Allows you to assign unregistered IP addresses to your computers 
 1. These addresses fall into a range of addresses designated for use on 
private networks. 
 2. The addresses are not registered to any Internet user, and are therefore 
not visible from the Internet, preventing outside users from accessing 
them. 
 a. An Internet server cannot send packets to your network, so your users 
can send traffic to the Internet but cannot receive it. 
 D. To make normal Internet communications possible, the router that 
provides Internet access can use NAT. 
 1. When one of the computers on your network attempts to access an 
Internet server by using a Web browser, the Hypertext Transfer Protocol 
(HTTP) request packet it generates contains its own private IP address in 
the IP header’s Source IP Address field. 
 2. When this packet reaches the router, the NAT software substitutes its 
own registered IP address for the client computer’s private address and 
sends the packet on to the designated server. 
 3. When the server responds, it addresses its reply to the NAT router’s IP 
address. 
 4. The router inserts the original client’s private address into the 
Destination IP Address field and sends the packet on to the client 
system. 
 E. The NAT router functions as an intermediary between the private 
network and the Internet. 
10 Outline, Chapter 13 
 Network+ Certification, Second Edition 
 1. Because only the router’s registered IP address is visible to the Internet, 
it is the only computer that is vulnerable to attack. 
 F. NAT is implemented in numerous firewall products, ranging from high-
end routers used on large corporate networks to inexpensive Internet 
connection-sharing solutions designed for small networks. 
 1. The Internet Connection Sharing (ICS) feature included with the latest 
versions of Windows is based on the principle of NAT. 
|20| 4. Proxy Servers 
 A. Similar to NAT routers, except that they function at the application layer 
of the OSI reference model 
 B. A proxy server acts as an intermediary between the clients on a private 
network and the Internet resources they want to access. 
 1. Clients send their requests to the proxy server, which sends a duplicate 
request to the desired Internet server. 
 2. The Internet server replies to the proxy server, which relays the response 
to the client. 
 C. A proxy server renders the private network invisible to the Internet and 
also provides other features. 
 1. Proxy servers can cache the information they receive from the Internet. 
 a. If another client requests the same information, the proxy can supply 
it immediately from its cache instead of issuing another request to the 
Internet server. 
 2. Administrators can configure proxy servers to filter the traffic they 
receive, blocking users on the private network from accessing certain 
services. 
 a. You can configure most Web proxy servers to permit user access 
only to specific Web sites. 
 D. The main problem with proxy servers is that you sometimes must 
configure applications to use them. 
|21| 1. Configuring a client computer to use proxies for a variety of applications 
can be time-consuming. 
 2. Some proxy clients and servers now have automatic detection 
capabilities that enable a client application to discover the proxy servers 
on the network and use them. 
 E. Generally, proxy servers are the preferred solution when you want to 
impose greater restrictions on your users’ Internet access. 
 1. NAT provides more general Internet access without any unusual client 
configuration and still provides a similar degree of protection. 
Chapter 13, Lesson 4 
Security Protocols 
 1. Security Protocol Standards 
 A. Applications and operating systems use security protocols to protect 
data transmitted over the network. 
Outline, Chapter 13 11 
Network+ Certification, Second Edition 
 B. Security protocols include 
 1. IPSec 
 2. Layer 2 Tunneling Protocol (L2TP) 
 3. Secure Sockets Layer (SSL) 
 4. Kerberos 
 C. Functions 
 1. Implement specific types of data encryption 
 2. Define how the communicating computers exchange the information 
needed to read each other’s encrypted transmissions 
|22| 2. IPSec 
 A. IPSec is the acronym for Internet Protocol Security. 
 B. Colloquial term for a series of draft standards published by the Internet 
Engineering Task Force (IETF) 
 C. Defines a methodology that uses authentication and encryption to 
secure data transmitted over a local area network (LAN) 
 1. Most security protocols that encrypt data transmitted over a network are 
designed for use on the Internet or for specialized traffic between 
specific types of clients and servers. 
 2. IPSec is a standard to protect data as it is transmitted over a LAN. 
 D. IPSec consists of two separate protocols that provide different levels of 
security protection. 
 1. IP Authentication Header (AH) 
 2. IP Encapsulating Security Payload (ESP) 
 3. Using the two protocols together provides the best security IPSec can 
offer. 
|23| E. IP AH protocol 
 1. Provides authentication and guaranteed integrity of IP datagrams 
 2. Adds an extra header, right after the IP header, to the datagrams 
generated by the transmitting computer 
 3. When you use AH, the Protocol field in the IP header identifies the AH 
protocol instead of the transport layer protocol contained in the 
datagram. 
 4. The AH header contains the following: 
 a. A sequence number that prevents unauthorized computers from 
replying to a message 
 b. An integrity check value (ICV) that the receiving computer uses to 
verify that incoming packets have not been altered 
|24| F. IP ESP protocol 
 1. Provides datagram encryption 
 2. Encapsulates the transport layer data in each datagram, using its own 
header and trailer 
 3. Encrypts all of the data following the ESP header 
 4. Also contains a sequence number and an ICV 
 G. Using IPSec on a LAN 
12 Outline, Chapter 13 
 Network+ Certification, Second Edition 
 1. Both the transmitting and receiving systems must support the protocols. 
 2. Because all of the information that IPSec adds to packets appears inside 
the datagram, intermediate systems such as routers do not have to 
support the protocols. 
 3. Many of the major network operating systems support IPSec, including 
Windows 2000 and various forms of UNIX. 
 4. In Windows 2000, you configure the TCP/IP client to use IPSec in the 
Options tab of the Advanced TCP/IP Properties dialog box. 
 a. After you select IP Security and clicking Properties, the IP Security 
dialog box appears. 
 b. After you select the Use This IP Security Policy option, you can 
choose from the following policies: 
 (1) Client (Respond Only). Configures the computer to use IPSec 
only when another computer requests it 
 (2) Secure Server (Require Security). Configures the computer to 
require IPSec for all communications; denies connection 
attempts from computers that do not support IPSec 
 (3) Server (Request Security). Configures the computer to request 
the use of IPSec for all communications but to allow 
connections without IPSec when the other computer does not 
support it 
 H. IPSec can operate in two modes: transport mode and tunnel mode. 
 1. The IPSec functionality described in the previous section (section G) 
refers to transport mode operation. 
 a. The upper layer data carried inside a datagram is protected by 
authentication or encryption. 
 I. Tunnel mode operation 
 1. Intended for gateway-to-gateway communications, such as those used in 
virtual private networks (VPNs) 
 2. When two computers establish a VPN link across the Internet, the 
transmitting computer that originally generated the packet sends a 
normal datagram to a gateway (or router) that provides access to the 
Internet. 
 3. The gateway, operating in tunnel mode, then encapsulates each entire 
datagram (including the IP header) within another datagram, and IPSec 
encrypts and authenticates the entire construction. 
 a. The outer datagram functions as an encrypting “tunnel” through 
which the upper layer data travels in complete safety. 
 4. After passing through the Internet and on reaching the gateway leading 
to the destination computer, the outer datagram is stripped away and the 
data inside is authenticated and decrypted. 
 5. The gateway then forwards the original (unencrypted) datagram to the 
destination end system. 
 a. For this type of communication, the end systems involved in the 
transaction do not even need to support IPSec. 
Outline, Chapter 13 13 
Network+ Certification, Second Edition 
 3. L2TP 
|25| A. L2TP characteristics 
 1. L2TP is the acronym for Layer 2 Tunneling Protocol. 
 2. Derived from the Cisco Systems Layer 2 Forwarding protocol and the 
Microsoft Point-to-Point Tunneling Protocol (PPTP) 
 3. Now defined by an IETF document 
 4. IPSec can operate in tunnel mode independently or with L2TP. 
 B. L2TP creates a tunnel by encapsulating Point-to-Point Protocol (PPP) 
frames inside UDP packets. 
 1. Even if the PPP frame contains connection-oriented TCP data, it can be 
carried inside a connectionless UDP datagram. 
 2. The PPP frame can even contain Internetwork Packet Exchange (IPX) or 
NetBIOS Extended User Interface (NetBEUI) data. 
 C. L2TP has no encryption capabilities of its own. 
 1. L2TP uses the IPSec ESP protocol to encapsulate and encrypt the entire 
UDP datagram containing the PPP frame. 
 D. By the time the data is transmitted over the network, each packet 
consists of the original upper layer application data encapsulated within 
a PPP frame. 
 1. The PPP frame in turn is encapsulated by an L2TP frame, a UDP 
datagram, an ESP frame, an IP datagram, and finally another PPP frame. 
 a. At this point the packet is ready for transmission. 
 4. SSL 
|26| A. SSL characteristics 
 1. SSL is the acronym for Secure Sockets Layer. 
 2. A special-purpose security protocol that is designed to protect the data 
transmitted between Web servers and their client browsers 
 3. Virtually all of the Web servers and browsers available today support 
SSL. 
 a. Example: when you access a secured site on the Internet to purchase 
a product with a credit card, your browser is probably using SSL to 
communicate with the server. 
 b. If your browser displays the protocol heading https:// in its address 
field instead of http://, then you are connecting to a secured site. 
 4. Like IPSec, SSL provides authentication and encryption services. 
 a. Authentication is performed by the SSL Handshake Protocol 
(SSLHP), which also negotiates the method to be used to encrypt the 
data. 
 b. The SSL Record Protocol (SSLRP) packages the data in preparation 
for its encryption. 
 5. When a Web browser connects to a secured server, the server transmits a 
digital certificate to the client that it has obtained from a third-party 
certificate authority (CA). 
14 Outline, Chapter 13 
 Network+ Certification, Second Edition 
 a. The client then uses the CA’s public key, which is part of its SSL 
implementation, to extract the server’s public key from the 
certificate. 
 b. When the browser has the server’s public key, it can decipher the 
encrypted data sent to it by that server. 
 5. Kerberos 
|27| A. Kerberos characteristics 
 1. Kerberos is an authentication protocol typically used by directory 
services, such as Active Directory, to provide users with a single 
network logon capability. 
 2. Developed at the Massachusetts Institute of Technology and now 
standardized by the IETF 
 3. When a server running Kerberos (called an authentication server) 
authenticates a client, the server grants that client the credentials needed 
to access resources anywhere on the network. 
 4. Windows 2000 and other operating systems rely heavily on Kerberos to 
secure their client/server network exchanges. 
 B. The Kerberos authentication sequence 
 1. When a client logs on to a network that uses Kerberos, it sends a request 
message to an authentication server, which already possesses the account 
name and password associated with that client. 
 2. The authentication server responds by sending a ticket-granting ticket 
(TGT) to the client, which is encrypted using a key based on the client’s 
password. 
 3. Once the client receives the TGT, it prompts the user for the password 
and uses it to decrypt the TGT. 
 a. Because only that user (presumably) has the password, this process 
serves as an authentication. 
 4. Now that the client possesses the TGT, it can access network resources 
by sending a request to a ticket-granting server (TGS) containing an 
encrypted copy of the TGT. 
 a. The TGS may or may not be the same as the authentication server. 
 5. The TGS, on decrypting the TGT and verifying the user’s status, creates 
a server ticket and transmits it to the client. 
 a. The server ticket allows a specific client to access a specific server 
for a limited length of time. 
 b. The ticket also includes a session key, which the client and the server 
can use to encrypt the data transmitted between them, if necessary. 
 6. The client transmits the server ticket (which the TGS encrypted with a 
key that the server already possesses) to that server. 
 a. Upon decrypting the ticket, the server grants the client access to the 
desired resource. 
|28| Chapter Summary 
 A. Password policies ensure that users choose effective passwords. 
Outline, Chapter 13 15 
Network+ Certification, Second Edition 
 B. User-level security requires a separate account for each user. 
 C. In share-level security, all users access shares by using the same 
passwords. 
 D. A firewall is a hardware or software product that protects a network 
from unauthorized access, using techniques such as packet filtering, 
NAT, or proxy servers. 
 E. Applications and operating systems use security protocols, such as 
IPSec, L2TP, SSL, and Kerberos, to protect their data as it is 
transmitted over the network. 
            Các file đính kèm theo tài liệu này:
 ch13_0223.pdf ch13_0223.pdf