Bài giảng Network+ Certification - Chapter 13, Network Security

Tài liệu Bài giảng Network+ Certification - Chapter 13, Network Security: Chapter 13, Network Security |1| Chapter Overview A. Password Protection B. Security Models C. Firewalls D. Security Protocols Chapter 13, Lesson 1 Password Protection |2| 1. Using Passwords A. Passwords are the most common method of securing network resources. B. There are security mechanisms other than passwords. 1. Smart cards a. Credit card-like devices with a magnetic strip b. Must be run through a card reader connected to a computer for a user to access the network 2. Biometric devices a. Identify users by scanning unique physical characteristics, such as thumbprints or retina patterns C. Passwords can be an effective security mechanism, or they can be useless, depending on how they are used. 1. The strength of any password protection is based on the password policies that administrators set. 2. When users create their own passwords, they tend to choose short, simple ones, or use information that is easy to guess, such...

pdf15 trang | Chia sẻ: honghanh66 | Ngày: 19/03/2018 | Lượt xem: 132 | Lượt tải: 0download
Bạn đang xem nội dung tài liệu Bài giảng Network+ Certification - Chapter 13, Network Security, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
Chapter 13, Network Security |1| Chapter Overview A. Password Protection B. Security Models C. Firewalls D. Security Protocols Chapter 13, Lesson 1 Password Protection |2| 1. Using Passwords A. Passwords are the most common method of securing network resources. B. There are security mechanisms other than passwords. 1. Smart cards a. Credit card-like devices with a magnetic strip b. Must be run through a card reader connected to a computer for a user to access the network 2. Biometric devices a. Identify users by scanning unique physical characteristics, such as thumbprints or retina patterns C. Passwords can be an effective security mechanism, or they can be useless, depending on how they are used. 1. The strength of any password protection is based on the password policies that administrators set. 2. When users create their own passwords, they tend to choose short, simple ones, or use information that is easy to guess, such as birthdays or initials, or they use no password at all. 3. Assigning complex passwords to users can be equally ineffective, because the users might be compelled to write them down and leave them in obvious places. 4. The object is to find a middle ground between these two extremes. D. Most operating systems include tools that enable administrators to impose password policies on users. 1. Users can be forced to a. Choose passwords of a specific length b. Change passwords at regular intervals 2. These tools provide a middle ground that lets users choose effective passwords that they can remember easily. 3. Password policies are typically available in network operating systems that use a directory service to authenticate users and grant them access to network resources. a. You can set password policies on Windows 2000 and Microsoft Windows NT domain controllers and Novell NetWare servers. 2 Outline, Chapter 13 Network+ Certification, Second Edition b. You cannot set password policies in Microsoft Windows Me, Microsoft Windows 98, or Microsoft Windows 95. |3| 2. User Account Password Settings A. When you create a new user account in Windows 2000 or Windows NT, you can use the following check boxes in the New Object – User dialog box to control the basic password policies for the account: 1. User Must Change Password At Next Logon. Allows the administrator to assign the same password to each new user account created and forces the user to change that password during the first logon a. The administrator can password-protect the new accounts without having to track individual password assignments. 2. User Cannot Change Password. Prevents users from changing the password assigned to the account during its creation a. If an administrator elects to assign passwords to users, activating this option on all accounts ensures that he or she retains control over the password assignments. 3. Password Never Expires. Overrides other policies that cause passwords to expire after a specified time a. Users can still change their passwords at will, but they are not required to do so. 4. Account Is Disabled. Allows the administrator to temporarily prevent access to an account, eliminating the need to delete and re-create the account 3. Specifying Password Lengths A. Users tend to choose short passwords, because they are easier to type and remember, or use no password at all. 1. Short passwords are mathematically easier to guess. B. Most network operating systems let the administrator set a minimum password length requirement. 1. Longer passwords are harder to penetrate. 2. Windows 2000 supports passwords of up to 104 characters. 3. Windows NT supports passwords of up to 14 characters. 4. For most networks, a minimum password length of five or six characters is sufficient. a. Higher security might call for eight characters or more. C. In Windows 2000, you set password length restrictions by using the Group Policy feature. |4| 1. You can apply policies to domains, sites, or organizational units. |5| 2. When you activate the Minimum Password Length policy, you specify the minimum number of password characters by using the Security Policy Setting dialog box. Outline, Chapter 13 3 Network+ Certification, Second Edition 4. Setting Password Change Intervals A. Passwords should be changed regularly. B. Administrators can set a policy that forces users to change their passwords at specified intervals. 1. Typically, the user sees an extra dialog box when logging on after the change interval has expired. a. The dialog box forces the user to specify a new password before being granted access to the network. 2. Some administrators assign an initial password to an account to keep it secure and then force users to change that password during their first logon. |6| C. Windows 2000 has a Group Policy called Maximum Password Age that forces users to change their passwords at intervals of a specified number of days. D. Some users try to circumvent this policy by changing their passwords and then immediately changing them back again. 1. The following additional policies in the Windows 2000 Local Security Policy console can be used to prevent this: a. Enforce Password History. Allows you to specify the number of previous passwords that the operating system remembers for each user (1) When users change their passwords as required by the Maximum Password Age policy, they cannot reuse any of the previous passwords stored in the history. b. Minimum Password Age. Forces users to wait a specified number of days after changing their passwords before they can change them again (1) This prevents users from rapidly changing their passwords several times in a few minutes in an attempt to outmaneuver the history feature. 5. Enforcing Password Complexity A. Complex passwords are more difficult for intruders to guess. B. In most operating systems, passwords are case-sensitive. C. Mixing cases is a good way to make passwords more complex. 1. Example: FluFFy is a much better password than fluffy. D. Adding numbers and symbols to passwords makes them even more complex. 1. Example: FluFFy_9 is a better password than FluFFy. 2. Another technique is to take a sentence and use the first letter of each word to form a password, converting some words to numbers in the process. a. Example: the sentence “I eat fish for dinner every Friday” can become Ief4deF, a password that is extremely difficult to guess. 4 Outline, Chapter 13 Network+ Certification, Second Edition |7| E. Windows 2000 and Windows NT have a Passwords Must Meet Complexity Requirements policy that can be used to compel users to select complex passwords. 1. In Windows, a complex password is one that meets all of the following criteria: a. The password must contain at least six characters. b. The password cannot contain any part of the account’s user name. (1) Example: the password for an account with the name abaldwin cannot be abaldwin or contain baldwin, bald, and so forth. c. The password must include three of the following four character types: uppercase letters, lowercase letters, numerals, and symbols. 2. To use this policy in Windows NT, you must install the password filter module (PASSFILT.DLL). 6. Controlling Password Encryption A. Most operating systems store user passwords in encrypted form. B. The encryption algorithm used on the passwords in a Windows 2000 system is not reversible, by default. C. You can modify the default by enabling the Store Password Using Reversible Encryption For All Users In The Domain policy. 1. This causes the system to use an encryption method that can be reversed to recover forgotten passwords. 7. Setting Account Lockout Policies A. The brute force method of penetrating passwords is to keep guessing at the password until you discover it. B. An account lockout policy limits the number of password attempts a user is allowed. |8| C. Windows 2000 has three account lockout policies: 1. Account Lockout Duration. Specifies how long (in minutes) accounts should remain locked when the user exceeds the account lockout threshold a. Setting the value of this policy to 0 causes accounts to remain locked out until an administrator manually releases them. 2. Account Lockout Threshold. Specifies the number of logon attempts that users are allowed before their accounts are locked a. When the account is locked, no future logon attempts are permitted until the account is reset. b. Typographic errors, improper case, or forgotten passwords are common, so you should generally permit users at least three tries before locking the account. c. A value of 0 disables the lockout function. 3. Reset Account Lockout Counter After. Causes the failed logon counter to reset after a specified amount of time (in minutes) a. When a user logs on successfully, the failed logon counter is reset. Outline, Chapter 13 5 Network+ Certification, Second Edition b. If the user does not log on successfully, the counter that registers the number of failed logon attempts remains in place until this policy resets the counter. Chapter 13, Lesson 2 Security Models 1. Client/Server and Peer-to-Peer Networks A. The primary difference between client/server networks and peer-to-peer networks is the security models they use. |9| B. Client/server networks 1. User accounts are stored in a central location. 2. A user logs on to the network from a computer that transmits the user name and password to a server, which either grants or denies access to the network. 3. Account information can be stored in a centralized directory service or on individual servers. 4. A directory service, such as the Windows 2000 Active Directory service or the Novell Directory Services (NDS), provides authentication services for an entire network. a. A user logs on once and the directory service grants access to shared resources anywhere on the network. |10| C. Peer-to-peer networks 1. Each computer maintains its own security information and performs its own authentications. 2. Computers on this type of network can function as both clients and servers. 3. When a computer functioning as a client attempts to use resources (called shares) on another computer that is functioning as a server, the server itself authenticates the client before granting it access. D. The two basic security models used by Windows and most other operating systems are called user-level security and share-level security. 2. User-Level Security A. Based on individual accounts created for specific users 1. When you want to grant users permission to access resources on a specific computer, you select the users from a list of user accounts and specify the permissions you want to grant them. |11| a. In Windows 2000, you use a Permissions dialog box to assign permissions to specific users. 2. Windows 2000 and Windows NT always use user-level security, whether they are operating in client/server or peer-to-peer mode. |12| B. In peer-to-peer mode, each computer has its own user accounts. 1. When users log on to their computers, they are authenticated against an account on that system. 6 Outline, Chapter 13 Network+ Certification, Second Edition 2. If several people use the same computer, each must have a separate user account (or they must share a single account). 3. When users elsewhere on the network attempt to access server resources on that computer, they are also authenticated against the accounts on the computer that hosts the resources. 4. Example: a. Mark Lee must have an account (mlee) on his own computer to log on to it. b. To access other network resources, there must be an mlee account on each computer that he wants to access. c. If Mark attempts to access a network-attached computer on which there is no mlee account, he is prompted to supply the name and password of an account on that computer. d. If there is an mlee account on the network-attached computer, but with a different password, Mark is prompted to supply the correct password for that account. 5. The user-level, peer-to-peer security model is suitable only for relatively small networks because users must have separate accounts on every computer they want to access. a. If users want to change their account passwords, they must change them on every computer on which they have an account. 6. In this model, users typically maintain the accounts on their computers themselves. a. It would be impractical for an administrator to travel to each computer and create a new account for each new user. |13| C. On a client/server network, user-level security is easier to administer and can support networks of almost any size. 1. Administrators create user accounts in a directory service, such as Active Directory in Windows 2000 or a Windows NT domain. 2. When users log on to their computers, the directory service authenticates them. a. The computer sends the account name and password supplied by the user to a domain controller, where the directory service information is stored. b. The domain controller then checks the credentials and indicates to the computer whether the authentication has succeeded or failed. 3. When you want to allow other network users to gain access to resources on your computer, you select their user accounts from a list provided by the domain controller. 4. With all accounts stored in a centralized directory service, administrators and users can make changes more easily. 3. Share-Level Security |14| A. Windows Me, Windows 98, and Windows 95 cannot maintain their own user accounts. 1. These operating systems can employ user-level security only when they are participating in an Active Directory or Windows NT domain. Outline, Chapter 13 7 Network+ Certification, Second Edition B. In peer-to-peer mode, Windows Me, Windows 98, and Windows 95 operate by using share-level security. 1. In share-level security, users assign passwords to the individual shares they create on their computers. 2. When network users want to access a share on another computer, they must supply the appropriate password. 3. The share passwords are stored on the individual computers. 4. When sharing drives, users can specify two different passwords to provide both read-only access and full control of the share. 5. Disadvantages of share-level security a. It is not as flexible as user-level security. b. It does not provide as much protection as user-level security. (1) Because everyone uses the same password to access a shared resource, it is difficult to keep the passwords secure. c. Changing a password means informing everyone who might have to use that resource. 6. The advantage of share-level security is that even unsophisticated users can learn to set up and maintain their own share passwords. a. This eliminates the need for constant attention from a network administrator. Chapter 13, Lesson 3 Firewalls |16| 1. What Is a Firewall? A. A firewall is a hardware or software product designed to protect a network from unauthorized access by outside parties. 1. Networks that are connected to the Internet must have some sort of firewall to protect them from Internet intruders. 2. Firewalls can also protect one section of the network from the rest of the network. B. A firewall is a barrier between two networks that evaluates all incoming or outgoing traffic to determine whether it should be permitted to pass to the other network. 1. Firewalls can be a. Dedicated hardware devices (essentially routers with additional software that monitors incoming and outgoing traffic) b. Software products that run on a standard computer 2. At one time, all firewalls were complex, extremely expensive, and used only in professional network installations. a. Today, there are also inexpensive firewall software products designed to protect a small network or even an individual computer from unauthorized access through an Internet connection. |17| 2. Packet Filtering A. The most basic type of firewall 8 Outline, Chapter 13 Network+ Certification, Second Edition B. Functions 1. Examines arriving packets 2. Decides whether to allow the packets access to the network, based on the information found in the protocol headers used to construct the packets C. Packet filtering can occur at several layers of the Open Systems Interconnection (OSI) reference model. characteristics: 1. Hardware addresses a. Packet filtering based on hardware addresses enables only certain computers to transmit data to the network. b. Not used to protect networks from unauthorized Internet access c. Use this technique in an internal firewall to permit only specific computers to access a particular network. 2. IP addresses a. Permit only traffic destined to or originating from specific addresses to pass through to the network b. If you have a public Web server on your network, you can configure a firewall to admit only the Internet traffic that is destined for that server’s IP address. (1) Prevents Internet users from accessing any of the other computers on the network 3. Protocol identifiers a. Filter packets based on the protocol that generated the information carried within an IP datagram, such as the Transmission Control Protocol (TCP), the User Datagram Protocol (UDP), or the Internet Control Message Protocol (ICMP) 4. Port numbers a. Filter packets based on the source or destination port number specified in a packet’s transport layer protocol header (1) Called service-dependent filtering b. Port numbers identify the application or service that generated the packet or service that the packet is destined for. c. You can configure a firewall to permit network users to access the Internet using ports 110 and 25 (the well-known port numbers used for incoming and outgoing e-mail) but deny them Internet access using port 80 (the port number used to access Web servers). E. The strength of the protection provided by packet filtering is its ability to combine the various types of filters. 1. Example: you might want to permit Telnet traffic into your network from the Internet, so that network support personnel can remotely administer certain computers. a. However, leaving port 23 (the Telnet port) open to all Internet users is a potentially disastrous security breach. b. Therefore, you can combine the port number filter with an IP address filter to permit only certain computers (those of the network administrators) to access the network using the Telnet port. Outline, Chapter 13 9 Network+ Certification, Second Edition F. Packet filtering capabilities are usually provided with a standard router. 1. Windows 2000 includes its own basic packet filtering mechanism. G. Packet filtering usually does not have a major effect on the router’s throughput, unless you create a large number of filtering rules. 1. The router must process each packet individually against the filtering rules you create, so a very complex system of filters can conceivably slow the network down. H. The main drawback of packet filtering is that it requires a detailed understanding of TCP/IP communications and the techniques that potential intruders use. 1. You must be ready to modify your filters to counteract new techniques developed by intruders. |19| 3. NAT A. NAT is the acronym for network address translation. B. A network layer technique that protects the computers on your network from Internet intruders by masking their IP addresses 1. If you connect a network to the Internet without firewall protection, you must use registered IP addresses. a. Registered IP addresses are visible from the Internet. b. Any user on the Internet can access your network’s computers and their resources. C. Allows you to assign unregistered IP addresses to your computers 1. These addresses fall into a range of addresses designated for use on private networks. 2. The addresses are not registered to any Internet user, and are therefore not visible from the Internet, preventing outside users from accessing them. a. An Internet server cannot send packets to your network, so your users can send traffic to the Internet but cannot receive it. D. To make normal Internet communications possible, the router that provides Internet access can use NAT. 1. When one of the computers on your network attempts to access an Internet server by using a Web browser, the Hypertext Transfer Protocol (HTTP) request packet it generates contains its own private IP address in the IP header’s Source IP Address field. 2. When this packet reaches the router, the NAT software substitutes its own registered IP address for the client computer’s private address and sends the packet on to the designated server. 3. When the server responds, it addresses its reply to the NAT router’s IP address. 4. The router inserts the original client’s private address into the Destination IP Address field and sends the packet on to the client system. E. The NAT router functions as an intermediary between the private network and the Internet. 10 Outline, Chapter 13 Network+ Certification, Second Edition 1. Because only the router’s registered IP address is visible to the Internet, it is the only computer that is vulnerable to attack. F. NAT is implemented in numerous firewall products, ranging from high- end routers used on large corporate networks to inexpensive Internet connection-sharing solutions designed for small networks. 1. The Internet Connection Sharing (ICS) feature included with the latest versions of Windows is based on the principle of NAT. |20| 4. Proxy Servers A. Similar to NAT routers, except that they function at the application layer of the OSI reference model B. A proxy server acts as an intermediary between the clients on a private network and the Internet resources they want to access. 1. Clients send their requests to the proxy server, which sends a duplicate request to the desired Internet server. 2. The Internet server replies to the proxy server, which relays the response to the client. C. A proxy server renders the private network invisible to the Internet and also provides other features. 1. Proxy servers can cache the information they receive from the Internet. a. If another client requests the same information, the proxy can supply it immediately from its cache instead of issuing another request to the Internet server. 2. Administrators can configure proxy servers to filter the traffic they receive, blocking users on the private network from accessing certain services. a. You can configure most Web proxy servers to permit user access only to specific Web sites. D. The main problem with proxy servers is that you sometimes must configure applications to use them. |21| 1. Configuring a client computer to use proxies for a variety of applications can be time-consuming. 2. Some proxy clients and servers now have automatic detection capabilities that enable a client application to discover the proxy servers on the network and use them. E. Generally, proxy servers are the preferred solution when you want to impose greater restrictions on your users’ Internet access. 1. NAT provides more general Internet access without any unusual client configuration and still provides a similar degree of protection. Chapter 13, Lesson 4 Security Protocols 1. Security Protocol Standards A. Applications and operating systems use security protocols to protect data transmitted over the network. Outline, Chapter 13 11 Network+ Certification, Second Edition B. Security protocols include 1. IPSec 2. Layer 2 Tunneling Protocol (L2TP) 3. Secure Sockets Layer (SSL) 4. Kerberos C. Functions 1. Implement specific types of data encryption 2. Define how the communicating computers exchange the information needed to read each other’s encrypted transmissions |22| 2. IPSec A. IPSec is the acronym for Internet Protocol Security. B. Colloquial term for a series of draft standards published by the Internet Engineering Task Force (IETF) C. Defines a methodology that uses authentication and encryption to secure data transmitted over a local area network (LAN) 1. Most security protocols that encrypt data transmitted over a network are designed for use on the Internet or for specialized traffic between specific types of clients and servers. 2. IPSec is a standard to protect data as it is transmitted over a LAN. D. IPSec consists of two separate protocols that provide different levels of security protection. 1. IP Authentication Header (AH) 2. IP Encapsulating Security Payload (ESP) 3. Using the two protocols together provides the best security IPSec can offer. |23| E. IP AH protocol 1. Provides authentication and guaranteed integrity of IP datagrams 2. Adds an extra header, right after the IP header, to the datagrams generated by the transmitting computer 3. When you use AH, the Protocol field in the IP header identifies the AH protocol instead of the transport layer protocol contained in the datagram. 4. The AH header contains the following: a. A sequence number that prevents unauthorized computers from replying to a message b. An integrity check value (ICV) that the receiving computer uses to verify that incoming packets have not been altered |24| F. IP ESP protocol 1. Provides datagram encryption 2. Encapsulates the transport layer data in each datagram, using its own header and trailer 3. Encrypts all of the data following the ESP header 4. Also contains a sequence number and an ICV G. Using IPSec on a LAN 12 Outline, Chapter 13 Network+ Certification, Second Edition 1. Both the transmitting and receiving systems must support the protocols. 2. Because all of the information that IPSec adds to packets appears inside the datagram, intermediate systems such as routers do not have to support the protocols. 3. Many of the major network operating systems support IPSec, including Windows 2000 and various forms of UNIX. 4. In Windows 2000, you configure the TCP/IP client to use IPSec in the Options tab of the Advanced TCP/IP Properties dialog box. a. After you select IP Security and clicking Properties, the IP Security dialog box appears. b. After you select the Use This IP Security Policy option, you can choose from the following policies: (1) Client (Respond Only). Configures the computer to use IPSec only when another computer requests it (2) Secure Server (Require Security). Configures the computer to require IPSec for all communications; denies connection attempts from computers that do not support IPSec (3) Server (Request Security). Configures the computer to request the use of IPSec for all communications but to allow connections without IPSec when the other computer does not support it H. IPSec can operate in two modes: transport mode and tunnel mode. 1. The IPSec functionality described in the previous section (section G) refers to transport mode operation. a. The upper layer data carried inside a datagram is protected by authentication or encryption. I. Tunnel mode operation 1. Intended for gateway-to-gateway communications, such as those used in virtual private networks (VPNs) 2. When two computers establish a VPN link across the Internet, the transmitting computer that originally generated the packet sends a normal datagram to a gateway (or router) that provides access to the Internet. 3. The gateway, operating in tunnel mode, then encapsulates each entire datagram (including the IP header) within another datagram, and IPSec encrypts and authenticates the entire construction. a. The outer datagram functions as an encrypting “tunnel” through which the upper layer data travels in complete safety. 4. After passing through the Internet and on reaching the gateway leading to the destination computer, the outer datagram is stripped away and the data inside is authenticated and decrypted. 5. The gateway then forwards the original (unencrypted) datagram to the destination end system. a. For this type of communication, the end systems involved in the transaction do not even need to support IPSec. Outline, Chapter 13 13 Network+ Certification, Second Edition 3. L2TP |25| A. L2TP characteristics 1. L2TP is the acronym for Layer 2 Tunneling Protocol. 2. Derived from the Cisco Systems Layer 2 Forwarding protocol and the Microsoft Point-to-Point Tunneling Protocol (PPTP) 3. Now defined by an IETF document 4. IPSec can operate in tunnel mode independently or with L2TP. B. L2TP creates a tunnel by encapsulating Point-to-Point Protocol (PPP) frames inside UDP packets. 1. Even if the PPP frame contains connection-oriented TCP data, it can be carried inside a connectionless UDP datagram. 2. The PPP frame can even contain Internetwork Packet Exchange (IPX) or NetBIOS Extended User Interface (NetBEUI) data. C. L2TP has no encryption capabilities of its own. 1. L2TP uses the IPSec ESP protocol to encapsulate and encrypt the entire UDP datagram containing the PPP frame. D. By the time the data is transmitted over the network, each packet consists of the original upper layer application data encapsulated within a PPP frame. 1. The PPP frame in turn is encapsulated by an L2TP frame, a UDP datagram, an ESP frame, an IP datagram, and finally another PPP frame. a. At this point the packet is ready for transmission. 4. SSL |26| A. SSL characteristics 1. SSL is the acronym for Secure Sockets Layer. 2. A special-purpose security protocol that is designed to protect the data transmitted between Web servers and their client browsers 3. Virtually all of the Web servers and browsers available today support SSL. a. Example: when you access a secured site on the Internet to purchase a product with a credit card, your browser is probably using SSL to communicate with the server. b. If your browser displays the protocol heading https:// in its address field instead of http://, then you are connecting to a secured site. 4. Like IPSec, SSL provides authentication and encryption services. a. Authentication is performed by the SSL Handshake Protocol (SSLHP), which also negotiates the method to be used to encrypt the data. b. The SSL Record Protocol (SSLRP) packages the data in preparation for its encryption. 5. When a Web browser connects to a secured server, the server transmits a digital certificate to the client that it has obtained from a third-party certificate authority (CA). 14 Outline, Chapter 13 Network+ Certification, Second Edition a. The client then uses the CA’s public key, which is part of its SSL implementation, to extract the server’s public key from the certificate. b. When the browser has the server’s public key, it can decipher the encrypted data sent to it by that server. 5. Kerberos |27| A. Kerberos characteristics 1. Kerberos is an authentication protocol typically used by directory services, such as Active Directory, to provide users with a single network logon capability. 2. Developed at the Massachusetts Institute of Technology and now standardized by the IETF 3. When a server running Kerberos (called an authentication server) authenticates a client, the server grants that client the credentials needed to access resources anywhere on the network. 4. Windows 2000 and other operating systems rely heavily on Kerberos to secure their client/server network exchanges. B. The Kerberos authentication sequence 1. When a client logs on to a network that uses Kerberos, it sends a request message to an authentication server, which already possesses the account name and password associated with that client. 2. The authentication server responds by sending a ticket-granting ticket (TGT) to the client, which is encrypted using a key based on the client’s password. 3. Once the client receives the TGT, it prompts the user for the password and uses it to decrypt the TGT. a. Because only that user (presumably) has the password, this process serves as an authentication. 4. Now that the client possesses the TGT, it can access network resources by sending a request to a ticket-granting server (TGS) containing an encrypted copy of the TGT. a. The TGS may or may not be the same as the authentication server. 5. The TGS, on decrypting the TGT and verifying the user’s status, creates a server ticket and transmits it to the client. a. The server ticket allows a specific client to access a specific server for a limited length of time. b. The ticket also includes a session key, which the client and the server can use to encrypt the data transmitted between them, if necessary. 6. The client transmits the server ticket (which the TGS encrypted with a key that the server already possesses) to that server. a. Upon decrypting the ticket, the server grants the client access to the desired resource. |28| Chapter Summary A. Password policies ensure that users choose effective passwords. Outline, Chapter 13 15 Network+ Certification, Second Edition B. User-level security requires a separate account for each user. C. In share-level security, all users access shares by using the same passwords. D. A firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers. E. Applications and operating systems use security protocols, such as IPSec, L2TP, SSL, and Kerberos, to protect their data as it is transmitted over the network.

Các file đính kèm theo tài liệu này:

  • pdfch13_0223.pdf
Tài liệu liên quan