The traffic we send across the network is subject to viewing by anyone along the way. In this video, you’ll learn about which protocols and services should be used to ensure a secure communications channel.
A centralized authentication mechanism provides an easy way for your users to access their important resources and it provides the administrator with a central mechanism for access control. In this video, you’ll learn how RADIUS and TACACS can be used to authenticate, authorize, and account for logins.
Without routing protocols, our routers wouldn’t know how to move traffic across our worldwide networks. In this video, we’ll describe link state routing protocols, distance-vector routing protocols, and one routing protocol that is a hybrid between both of those.
At the top of the Internet Protocol suite is the application layer. In part two of our conversation on protocols, we’ll detail the most common application layer protocols and discuss some practical examples of how the protocols are used.
The Network+ certification expects every networking professional to be familiar with the most common networking protocols and the location of these common protocols in the Internet Protocol suite. In this video, we’ll detail the important protocols in the link, internet, and transport layers of the IP suite.