Tag protocol

Web-based IAM Protocols

This post contains web-based Identity and Access Management (IAM) protocols. OpenID allows to use an account from another service. List of Web-based IAM Protocols Web-based Many of these protocols are used in combination to achieve Single Sign-on (SSO) or federation.…

AAA Network Protocols

This post summarizes Authentication, Authorization and Accountability (AAA) protocols or AAA network protocols. Do not confuse the AAA protocols with the authentication protocols like EAP, CHAP and PAP. Authentication protocols works in the OSI layers 2 and 3, and AAA…

Email Protocols

This post presents some aspects related to electronic mail (email or e-mail) protocols. Email Operational Protocols STMP An open relay is an insecure SMTP server that does not authenticate sneders before accepting and relaying email and are typically quickly exploited…

Network Routing Protocols

This post summarizes gateway protocols or routing protocols on computer networks. All of them are within OSI layer 3. List of Network Routing Protocols Overall list of network routing protocols: The two main categories of network routing protocols are: Interior…

List of VPN Protocols

This post summarizes the most common Virtual Private Network (VPN) protocols. VPN Protocols VPN (Virtual Private Network) protocols: RADIUS AAA protocol can also establish a VPN. PPTP Deprecated Point to Point Tunneling Protocol (PPTP) is a legacy solution, and it…

NetBIOS

Network Basic Input/Output System (NetBIOS) is a protocol of OSI session layer 5. It provides a NetBIOS name to each computer, in addition to the already existing IP address from OSI network layer 3. Nowadays, NetBIOS runs over TCP The…

Types of Wi-Fi Connections

Encryption algorithms: Encryption protocols: Wi-Fi security modes: Authentication options supported by WPA, WPA2 and WPA3: PSK is the use of a static fixed password or authentication. ENT enables the leveraging of and existing AAA (Authentication, Authorization and Accounting) service to…