Chapter 18

1: What are VSAs?
A1: Answer: Vendor-specific attributes are derived from attribute 26 of RADIUS, which allows various vendors to define their customized RADIUS attributes.
2: What types of messages does the RADIUS protocol use in the authentication process?
A2: Answer: RADIUS uses four types of messages during authentication: request, accept, reject, and challenge.
3: What types of information are relayed from the RADIUS server during RADIUS authorization?
A3: Answer: Two types of information are exchanged during RADIUS authorization: services that the user can access, and parameters regarding these services.
4: Which hashing algorithm is used to encrypt user passwords?
A4: Answer: The user password is XORed with an MD5-generated hash to ...

Get Network Security Principles and Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.