Welcome to Bucaro TecHelp!

Bucaro TecHelp
HTTPS Encryption not required because no account numbers or
personal information is ever requested or accepted by this site

About Bucaro TecHelp About BTH User Agreement User Agreement Privacy Policy Privacy Site Map Site Map Contact Bucaro TecHelp Contact RSS News Feeds News Feeds

Remote Access Authentication Protocols

A remote access authentication protocol is the method by which remote users will be authenticated when they log on the network. One (unwise) choice is to allow users to log on without authentication.

Extensible Authentication Protocol (EAP)

EAP allows for authentication of a remote access connection through the use of authentication schemes, known as EAP types. EAP offers the strongest security by providing the most flexibility in authentication variations. EAP can support authentication mechanisms, such as token cards, smart cards, certificates, and public key encryption authentication.

Challenge Handshake Authentication Protocol (CHAP)

CHAP enables authentication without having the user send their password over the connection. The server sends a challenge message to the connection requester. The requester responds with a value obtained by using the industry-standard Message Digest 5 (MD5) hashing scheme to encrypt the response. The server checks the response by comparing it its own calculation of the expected hash value. MS-CHAP, which supports only Windows Servers, works the same way as CHAP.

Password Authentication Protocol (PAP)

PAP is the least secure authentication protocol. The username and password is sent in plaintext. It does not protect against anyone listening to network traffic from stealing the username and password. It is used only when the remote access client or the remote access server cannot negotiate a more secure form of validation.

More Network Security Articles:
• Understanding the Dangers Your Systems Face
• Why Become a CISSP?
• Cyber Security Tips for Small and Medium Business (SMB)
• The Role of Security Penetration Testers
• What is a Botnet Attack and How to Identify It?
• NMAP (Network Mapper) Port Scanner
• What is Penetration Testing?
• Man in the Middle Attack
• Network Security Model - Defining an Enterprise Security Strategy
• Types of DoS (Denial of Service) Attacks

RSS Feed RSS Feed

Follow Stephen Bucaro Follow @Stephen Bucaro


Computer Networking Sections

Fire HD
[Site User Agreement] [Privacy Policy] [Site map] [Search This Site] [Contact Form]
Copyright©2001-2024 Bucaro TecHelp 13771 N Fountain Hills Blvd Suite 114-248 Fountain Hills, AZ 85268