123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Business >> View Article

Designing Secure Communications

Profile Picture
By Author: Shirley Green
Total Articles: 129
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The following user authentication information should be considered 70-291 Exam in making authentication choices:
User authentication is via PPP authentication protocols. Password authentication protocol (PAP), which sends a plain-text password across the network, is very rarely used.
Challenge Handshake Authentication Protocol (CHAP) uses the MD5 hashing protocol to encrypt challenge strings. Only the user name crosses the network in plaintext. The server must store a plain-text copy of the password, or store the password using a reversible encryption algorithm, as is the case in Windows Server2003. CHAP is generally used only when UNIX clients are present.
Microsoft CHAP (MS-CHAP) uses an MD4 hash, and the server can store a hashed password. The protocol provides more sophisticated error messages—including a
password-expired error code, which then provides the ability to change a password during the authentication phase. The client and server independently create
the encryption key MS CHAP requires for MPPE encryption based on the user's password. MCSA Certification ...
... should be used only if you have Windows 95 clients.
MS CHAPv2 provides for mutual authentication—both client and server identify that each have knowledge of the user's password. Two encryption keys are used:
one for sending text and the other for receiving text. As with MS-CHAP, the encryption keys are based on the user's password. Consequently, the strength of
the encryption key is directly proportional to the strength of the user's password.
Extensible Authentication Protocol (EAP) is an IETF (RFC 2284) extension to PPP.A choice of authentication algorithms known as EAP types can be made.
EAP is negotiated during the authentication phase of PPP.Because EAP allows arbitrary authentication mechanisms for PPP authentication,the dynamic addition of authentication component modules is supported. This means vendors can supply new authentication protocols at any time.
When new,stronger authentication processes are identified, the PPP protocol does not have to be rewritten the vendor simply write an EAP type that is compatible with PPP.

O EAP-TLS is based on a public-key certificate and enables mutual authentica-tion between the client and server computers that make up the VPN connec-tion. Before data can be transmitted, a client certificate must be provided to and validated by the dial-in server and the server must provide its own, which must be validated by the client. EAP-TLS can be used with PPTP. In this case, the server must have a Network+ certification, but the client computers do not require one. User certificates can be installed on client computers or smart cards.

Total Views: 379Word Count: 398See All articles From Author

Add Comment

Business Articles

1. Fitatoo Smile Eco Raglan Hoodie Sustainable Streetwear In The Uk
Author: Fitatoo

2. Bridging Knowledge Gaps In Hse Through Interactive E-learning
Author: Jane

3. Role Of Quick Lime In The Pulp And Paper Industry: Uses And Benefits
Author: Shaurya Minerals

4. Top 5 Mistakes Homeowners Make When Hiring A Builder In Chennai And How To Avoid Them
Author: bharathi

5. Bpo Projects For Startup Company: Grow With Zoetic Bpo Services
Author: mohan

6. Scorpio Technologies – The Leading Responsive Web Design Company In Chennai
Author: scorpiotechnologies

7. Scorpio Technologies: The Best Web Design Service In Chennai
Author: scorpiotechnologies

8. Latest Indo Western Dress – Elegant Fusion Fashion
Author: le concept

9. Top Logo Designer In Ahmedabad: Crafting Unique Brand Identities That Speak Volumes
Author: Kymin Creation

10. What Types Of Noise Barriers Are Used To Lessen Noise Pollution?
Author: O'Neill Engineered Systems, Inc

11. Why Are Container Inspections Important For Safety?
Author: TIC

12. 10 Essential Tips For During Production Inspection
Author: TIC

13. What Is A Pre Production Inspection And Why Is It Important?
Author: TIC

14. How Does Quality Inspection Impact Product Quality?
Author: TIC

15. 8 Benefits Of Regular Quality Inspections
Author: TIC

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: