Uploaded by sulmi munavvir

NOTES

advertisement
TTLS:
TTLS (Tunneled Transport Layer Security) is a security protocol used for authentication and secure communication in wireless networks. It is an extension of the EAP (Extensible Authentication Protocol) framework and is often used in conjunction with 802.1x authentication.
TTLS creates a secure tunnel between the client device and the authentication server, allowing the exchange of authentication information and encryption keys. This tunnel is established using a shared secret, which is typically a username and password combination.
The authentication process using TTLS typically proceeds as follows:
The client device sends an authentication request to the access point or wireless controller.
The access point or wireless controller forwards the authentication request to the authentication server.
The authentication server responds with a request for the client to establish a TLS tunnel.
The client device responds by sending a TLS ClientHello message to the authentication server.
The authentication server responds with a TLS ServerHello message, initiating the TLS handshake.
The client device and authentication server exchange certificates and establish a secure tunnel for further communication.
The client device sends its authentication credentials (e.g., username and password) over the secure tunnel to the authentication server for verification.
If the credentials are valid, the authentication server sends an Access-Accept message to the access point or wireless controller, which allows the client device to access the network. If the credentials are invalid, the authentication server sends an Access-Reject message, and the client device is denied access.
TTLS provides strong security for authentication and data privacy by encrypting the entire authentication process and the data transmitted between the client device and authentication server. It is commonly used in enterprise wireless networks and is compatible with a wide range of authentication methods, including PAP, MS-CHAP, and EAP-TLS.
PEAP:
PEAP (Protected Extensible Authentication Protocol) is a security protocol used for authentication and secure communication in wireless networks. It is similar to TTLS in that it creates a secure tunnel between the client device and the authentication server, but it uses a different approach to establish the secure tunnel.
PEAP creates a TLS (Transport Layer Security) tunnel within which the authentication process takes place. This tunnel is established using a server-side digital certificate that the client device verifies before exchanging authentication credentials.
The authentication process using PEAP typically proceeds as follows:
The client device sends an authentication request to the access point or wireless controller.
The access point or wireless controller forwards the authentication request to the authentication server.
The authentication server responds with a request for the client to establish a TLS tunnel.
The client device responds by sending a TLS ClientHello message to the authentication server.
The authentication server responds with a TLS ServerHello message, initiating the TLS handshake.
The authentication server presents its digital certificate to the client device for verification.
The client device verifies the server's digital certificate and establishes a secure TLS tunnel.
The client device sends its authentication credentials (e.g., username and password) over the secure TLS tunnel to the authentication server for verification.
If the credentials are valid, the authentication server sends an Access-Accept message to the access point or wireless controller, which allows the client device to access the network. If the credentials are invalid, the authentication server sends an Access-Reject message, and the client device is denied access.
PEAP provides strong security for authentication and data privacy by encrypting the entire authentication process and the data transmitted between the client device and authentication server. It is commonly used in enterprise wireless networks and is compatible with a wide range of authentication methods, including PAP, MS-CHAP, and EAP-TLS.
IDC:
IDC stands for Insulation Displacement Connector. It is a type of electrical connector used to terminate flat, ribbon-like cables or wires. IDC connectors are commonly used in computer and telecommunications equipment for connecting devices such as hard drives, CD/DVD drives, and network devices.
IDC connectors work by displacing the insulation of the cable or wire, allowing the conductor to be exposed and making contact with the connector. This is typically done by pressing the cable or wire into a slot on the connector using a tool such as a punch-down tool or crimping tool.
One advantage of IDC connectors is that they are fast and easy to terminate, compared to other types of connectors such as soldered or crimped connectors. IDC connectors are also reliable and have a low profile, making them well-suited for use in applications where space is limited.
IDC connectors are available in various configurations and sizes, including single-row and dual-row connectors, and can accommodate different cable or wire gauges. Some common types of IDC connectors include IDC headers, IDC sockets, and IDC ribbon cable connectors.
Overall, IDC connectors provide a cost-effective and reliable solution for terminating flat, ribbon-like cables or wires in a variety of applications.
Ptach panel:
A patch panel is a device that is used to terminate and organize network cables. It typically consists of a panel with a number of ports, which are used to connect and manage cables from different network devices such as switches, routers, and servers.
Patch panels are used to simplify network management and improve connectivity by providing a central location for network cables to be terminated and organized. They are commonly used in data centers, server rooms, and telecommunications closets.
Patch panels come in different types, including:
Blank patch panels - These are empty patch panels that can be customized based on the specific needs of the network. They allow for flexibility and expansion as the network grows.
Pre-loaded patch panels - These are patch panels that come with pre-installed connectors, such as RJ45 Ethernet jacks or fiber optic connectors.
Feed-through patch panels - These are patch panels that have connectors on both the front and back, allowing for easy cable management and connectivity.
Patch panels can be mounted on a rack or wall-mounted, depending on the needs of the network. They typically come in different sizes, ranging from 12-port patch panels to larger 48-port patch panels or higher.
Using a patch panel can provide several benefits to a network, including improved organization, ease of cable management, and reduced downtime due to easy replacement of faulty cables or devices. Additionally, using a patch panel can help to improve network performance and reduce the risk of signal loss due to cable damage or signal interference.
syslog:
The severity levels ranging from zero to seven are commonly used in the context of the Syslog protocol, which is used to convey system messages and events between devices on a network.
The Syslog severity levels are as follows:
Emergency: System is unusable.
Alert: Action must be taken immediately.
Critical: Critical condition, such as a component failure.
Error: Non-urgent error condition.
Warning: Warning condition, such as an impending resource shortage.
Notice: Normal but significant condition, such as a successful login.
Informational: Informational messages, such as system startup messages.
Debug: Debugging messages, typically only useful to developers.
The severity level is used to indicate the importance or urgency of the event or message, and can be used by system administrators to prioritize their response and troubleshooting efforts. The severity level is typically included in the syslog message header, along with other information such as the facility, timestamp, and hostname.
Download