Security Protocols

This chapter covers some of today's most widely used technologies that enable network administrators to ensure that sensitive data is secure from unauthorized sources.

Standards such as IP Security (IPSec) and encryption standards are covered, as are all the fundamental foundation topics you need to understand to master the topics covered in the CCIE Security written exam.

The chapter ends with a discussion of some of the security features used in wireless networking to improve security. Protocols such as Extensible Authentication Protocol (EAP), Protected Extensible Authentication Protocol (PEAP), Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC), and Transport Layer Security (TLS) are discussed, all of which are newly defined protocols used to help secure vulnerable wireless networks.

This chapter covers the following topics:

■ Security protocol topics—Sections are included for authentication, authorization, and accounting (AAA), RADIUS, and TACACS+.

■ Encryption Technology Overview—Covers encrypting IP using standard encryption such as 3DES, AES, and IPSec. The mechanism used to authenticate encryption tunnels is also covered.

■ Certificate Enrollment Protocol—Describes the Cisco-defined certificate management protocol, CEP, and how a device communicates with a Certificate Authority (CA).

■ EAP, PEAP, and TKIP—Shows common new mechanisms used in the fight to keep intruders and hackers away from wireless networks.

Was this article helpful?

0 0

Post a comment