Thursday, November 27, 2025

AAA, Radius, TACACS+, DTLS, TLS, SSL, RTS, CTS

 

1. AAA — Authentication, Authorization, Accounting

AAA is not a protocol.
It is a framework, a model, a set of functions that network devices use to control access.

AAA = The What

AAA supplies three services:

A — Authentication

“Prove who you are.”
Examples:

  • Username/password

  • SSH key

  • One-time token

A — Authorization

“Now that I know who you are, what can you do?”
Examples:

  • Which commands you can run on a router

  • Which VLAN your 802.1X session can join

  • Whether you can configure vs read-only

A — Accounting

“What did you do, when, and for how long?”
Examples:

  • Log each command entered on a router

  • Track login/logout times

  • Capture session statistics for billing or auditing


🟣 2. RADIUS (Remote Authentication Dial-In User Service)

RADIUS = The How (one way to do AAA)

UDP-based AAA protocol
Ports:

  • 1812 (Authentication/Authorization)

  • 1813 (Accounting)

Key Characteristics

Combines Authentication & Authorization

Cisco exam classic line:

RADIUS bundles authentication and authorization in the same packet exchange.

Encrypts only the password field

Not the entire payload.
(Shared secret hashes the password.)

UDP (connectionless)

Faster but less reliable.
If a packet drops, server doesn't retransmit.

Industry Standard

Used heavily for:

  • 802.1X wired/wireless access control

  • VPN authentication

  • Wi-Fi enterprise authentication (WPA2-Enterprise / EAP variants)

  • ISP/dial-up access control

  • NAC (ISE, ClearPass, etc.)

When is RADIUS used?

Best for network access:

  • Users connecting to Wi-Fi

  • VPN users

  • Switch ports using 802.1X

  • Remote user authentication

  • Any scenario where you need user identity + network policy


🔵 3. TACACS+ (Terminal Access Controller Access-Control System Plus)

TACACS+ = The Other Way to do AAA

Cisco-developed protocol
TCP-based, port 49

Key Characteristics

Separates Authentication, Authorization, & Accounting

Each “A” can be performed independently.
This is huge for network device admin control.

Encrypts the ENTIRE packet body

Not just the password.
Better for security and auditing commands.

Per-command authorization

The critical differentiator:

TACACS+ can allow/deny individual IOS commands.

Example:

  • Permit show commands

  • Deny config t

  • Permit only certain subcommands (e.g., interface, but not router bgp)

Cisco’s preferred method for device admin access

Used with Cisco ISE, ACS (legacy), Free TACACS servers, etc.

When is TACACS+ used?

For network device administration:

  • Routers

  • Switches

  • Firewalls

  • WLCs

  • Any infrastructure device where you want:

    • Per-command enforcement

    • Full encryption

    • Full audit trail of every command


🟢 4. Side-by-Side Comparison (CCNA-Accurate)

FeatureRADIUSTACACS+
Use CaseNetwork access (Wi-Fi, VPN, 802.1X)Device administration
OriginOpen standard (IETF)Cisco proprietary (but widely supported)
TransportUDPTCP
Ports1812/181349
EncryptionPassword onlyEntire packet body
StructureAuth + AuthZ combinedAuth, AuthZ, Accounting separate
Per-Command AuthZ❌ No✅ Yes
Logging granularitySession-levelCommand-level
Speed/ReliabilityFaster, less reliableSlower, more reliable
Best ForClients, users, endpointsEngineers, admins, operators

🟩 5. Typical Enterprise Deployment (Real World + Exam Relevant)

Use RADIUS for:

  • Enterprise Wi-Fi (WPA2/WPA3 Enterprise)

  • 802.1X network access control

  • VPN user authentication

  • NAC posture checks

  • Remote user access to networks

Use TACACS+ for:

  • Controlling who can log in to routers/switches/firewalls

  • Enforcing command-level restrictions

  • Tracking every CLI command entered by engineers

  • Providing auditing trails for compliance (SOX, PCI-DSS, NIST)


🟡 6. The High-Level “One-Sentence Rule” for Exams

Here are the lines Cisco loves:

AAA

“AAA is the security framework for authentication, authorization, and accounting.”

RADIUS

“RADIUS is an open-standard AAA protocol used mainly for network access. It uses UDP and only encrypts the password.”

TACACS+

“TACACS+ is Cisco’s device-administration AAA protocol using TCP and encrypting the entire payload, supporting per-command authorization.”


If you want, I can also produce:
✔ An Odom-style assimilation flashcard set
✔ A 10-question AAA/RADIUS/TACACS+ quiz
✔ Example Cisco IOS configs for both
✔ A diagram summarizing exactly how packets flow in each system

Just say the word.

You said:
Tell me about DTLS
ChatGPT said:

Here you go, Lou — a clear, CCNA-ready breakdown of DTLS, including what it is, why it exists, and where it’s used (especially in VPNs and wireless).


🔵 DTLS — Datagram Transport Layer Security

Definition

DTLS is a security protocol that provides TLS-style encryption and authentication but designed to work over UDP, not TCP.

Think of DTLS as:

TLS for unreliable, connectionless transport (UDP).

It brings TLS’s security guarantees — encryption, integrity, authentication, anti-replay — to protocols that can’t use TCP because they require speed or real-time behavior.


🔶 Why DTLS Exists

TLS requires TCP, which has:

  • Retransmission

  • Strict sequencing

  • Congestion control

  • Handshaking overhead

This is bad for:

  • Real-time voice/video (VoIP)

  • Low-latency apps

  • VPN tunnels built over UDP

  • IoT devices

  • Any app that can’t afford TCP’s built-in reliability

So DTLS was built to give TLS security without TCP slowdown.


🔵 Key DTLS Characteristics

✔ Works over UDP

No TCP retransmissions.
No congestion logic.
No stream-oriented transport.

✔ Provides TLS-level security

  • Encryption

  • Message integrity

  • Authentication (certificates or PSK)

  • Perfect Forward Secrecy (depending on cipher suite)

✔ Adds mechanisms TCP normally provides

Because UDP doesn’t have sequencing or reliability guarantees, DTLS adds:

  • Sequence numbers

  • Retransmission for handshake messages

  • Replay detection

  • Message fragmentation/reassembly

✔ Lower latency than TLS/TCP

Perfect for:

  • Voice

  • Video

  • VPN tunnels

  • IoT

✔ Used heavily in VPNs and Wireless


🔵 Where DTLS Is Used (Real World + CCNA-Relevant)

1. Cisco AnyConnect SSL VPN (Client → ASA/FTD)

This is the big one.

When a user connects with AnyConnect:

  • The control channel uses TLS

  • The data channel switches to DTLS for higher performance

Why?

Because most VPN traffic is UDP-based (VoIP, conferencing), and DTLS avoids TCP-over-TCP meltdown.

If DTLS fails?
The tunnel falls back to pure TLS — slower, more CPU load.


2. CAPWAP in Cisco Wireless

Yes, this is on CCNA.

Cisco WLCs can use:

  • CAPWAP control: DTLS encrypted

  • CAPWAP data: optionally DTLS (depends on deployment and performance needs)

WLCs and APs authenticate and encrypt messages using DTLS during CAPWAP join and control.

DTLS protects AP <-> WLC communication.


3. WebRTC (Real-time browser communication)

Web browsers use DTLS for:

  • Secure media

  • Secure key exchange

  • NAT traversal

DTLS-SRTP = secure voice/video in WebRTC.


4. IoT protocols

Low-latency messaging (CoAP, MQTT-SN) uses DTLS to secure UDP flows in constrained networks.


🟣 DTLS vs TLS (High-Level Comparison)

FeatureTLSDTLS
TransportTCPUDP
PurposeSecure reliable streamsSecure latency-sensitive datagrams
RetransmissionsHandled by TCPDTLS adds its own
Use CasesHTTPS, email, SSH-like tunnelsVPN (AnyConnect DTLS), CAPWAP, WebRTC, VoIP
PerformanceHigher latencyLower latency

🟢 Versioning

Current versions:

  • DTLS 1.0 ≈ TLS 1.1

  • DTLS 1.2 ≈ TLS 1.2

  • DTLS 1.3 is emerging (mirrors TLS 1.3) but not widespread yet

Most VPNs and WLCs today run DTLS 1.2.


🔵 Cisco Exam Takeaways (Memorize These)

These are the lines Odom and Cisco love:

1. DTLS = TLS over UDP for real-time traffic

2. Cisco AnyConnect uses DTLS for its data channel

3. CAPWAP control traffic is encrypted using DTLS

4. DTLS is more efficient than TLS for latency-sensitive applications

5. If DTLS fails in a VPN, tunnel falls back to TLS (slower)


🟡 Want a 5-question DTLS quiz to lock it in?

Say the word and I’ll hit you with CCNA-style questions.

You said:
What about SSL and TLS?
ChatGPT said:

Here you go, Lou — a clean, exam-accurate breakdown of SSL vs TLS, where they came from, how they differ, what Cisco expects you to know, and which ones are actually used today.


🔵 SSL vs TLS — The Straight Truth

SSL (Secure Sockets Layer)

  • Developed by Netscape in the mid-1990s

  • Early versions (SSL 1.0–3.0)

  • Known for major security weaknesses

  • Deprecated

  • No modern system should use SSL

TL;DR:

SSL is dead. Only appears today in legacy references or exam questions.


TLS (Transport Layer Security)

  • Designed as the successor to SSL

  • Standardized by IETF

  • TLS 1.0, 1.1, 1.2, 1.3

  • Actively used everywhere (HTTPS, VPNs, APIs, CAPWAP control channel, etc.)

TL;DR:

TLS is the modern, secure replacement for SSL.
All “SSL VPNs” actually use TLS under the hood.


🟢 Why Did TLS Replace SSL?

Major SSL problems:

  • Weak ciphers

  • Broken message authentication

  • Vulnerabilities like:

    • POODLE

    • BEAST

    • Heartbleed-related stuff affecting OpenSSL, etc.

TLS fixed this by:

  • Stronger cipher negotiation

  • Better message authentication (HMAC)

  • Better handshake

  • Improved record layer

  • Perfect Forward Secrecy support (ECDHE)


🟦 TLS Versions

TLS 1.0 (obsolete)

Comparable to SSL 3.0
Weak, insecure — forbidden in modern systems

TLS 1.1 (obsolete)

Better, but still not secure enough

TLS 1.2 (current workhorse)

Most common version today on:

  • HTTPS

  • APIs

  • Cisco AnyConnect control channel

  • CAPWAP DTLS

  • Almost everything secure

TLS 1.3 (modern & fast)

Fully redesigned handshake
Only the strongest ciphers
Better performance
Widely supported in browsers and many VPN appliances


🔵 SSL vs TLS — Exam-Level Distinctions

FeatureSSLTLS
StatusDeprecatedCurrent, secure
VersionsSSL 1.0–3.0TLS 1.0–1.3
Security LevelWeakStrong
HandshakeOlder, less secureImproved, supports modern crypto
EncryptionWeak ciphersModern ciphers (AES, GCM, CHACHA20)
Usage TodayNone (legacy only)Everywhere (HTTPS, VPNs, AP <-> WLC, APIs)

🔶 Common Confusion: "SSL VPN"

Cisco ASA, FTD, Palo Alto, and everyone else still call it an:

SSL VPN

But…

It actually uses TLS (and DTLS for data).

Vendors kept the “SSL VPN” name because people already understood it.


🔵 TLS vs DTLS

Since you asked about DTLS earlier, here’s how they all relate:

ProtocolTransportPurpose
TLSTCPSecure, reliable streams (HTTPS, VPN control channel)
DTLSUDPSecure, low-latency datagrams (VPN data channel, CAPWAP)
SSLTCPOld, insecure TLS predecessor

🟣 Cisco Wireless Tie-In (Important for CCNA)

  • CAPWAP control = DTLS

  • CAPWAP data = can be DTLS but often left unencrypted for performance

  • APs verify WLC using X.509 certificates

  • TLS/DTLS is the underlying security model — NOT SSL


🔴 The Exam Sentence to Memorize

Cisco-style, Odom-approved one-liner:

SSL is obsolete; modern secure communications use TLS. “SSL VPNs” are actually TLS-based VPNs, and DTLS provides TLS-style security for UDP applications.


Want to go deeper?

I can break down:
✔ The TLS handshake
✔ TLS 1.2 vs TLS 1.3 differences
✔ The role of certificates and CAs
✔ How AnyConnect selects TLS vs DTLS
✔ Exactly how CAPWAP uses DTLS


🔵 RTS / CTS — Request to Send / Clear to Send

RTS/CTS is a wireless coordination mechanism used to reduce collisions on a Wi-Fi network, especially in environments with hidden nodes.

It’s part of the 802.11 MAC layer.


🟣 Why RTS/CTS Exists

Because Wi-Fi is half-duplex and contention-based.

WLAN uses CSMA/CA:

  • Carrier Sense: listen before talking

  • Multiple Access: everyone shares the air

  • Collision Avoidance: try to prevent collisions (unlike Ethernet which detects collisions)

But listening alone doesn’t solve a key problem:


🔴 The Hidden Node Problem

Imagine:

  • Station A can hear the AP

  • Station B can hear the AP

  • A and B cannot hear each other

A thinks the air is clear → transmits
B thinks the air is clear → transmits
Their signals collide at the AP

RTS/CTS solves this.


🔵 How RTS/CTS Works (Simple Sequence)

1. Station wants to send a large frame

It first sends a small RTS frame:

“Request to send!”

2. AP receives RTS

If the medium is free, the AP replies with CTS:

“Clear to send!”

3. All other stations overhear CTS

They set a Network Allocation Vector (NAV):

“The channel is reserved; wait.”

4. Station sends its actual data

Collision likelihood is now very low.


🟢 Why It's Helpful

  • RTS/CTS frames are small

  • If they collide, you only lose a tiny control frame

  • Large data frames then transmit cleanly

This is massive for older 802.11 technologies and busy RF spaces.


🟣 When RTS/CTS Is Used

1. Hidden node environments

Walls
Obstacles
Far-apart clients

2. Large frame transmissions

APs may use RTS/CTS only for frames larger than a threshold.

3. High interference areas

Microwave ovens
Neighboring Wi-Fi
Bluetooth
Crowded offices

4. 802.11 protection mechanisms

Used to protect legacy 802.11b clients when 802.11n/ac/ax devices operate in mixed mode.


🔵 RTS/CTS Variants

Three modes exist:

RTS/CTS

Both sides participate using both frames.

CTS-to-Self

Client sends a CTS frame to itself:

  • Faster

  • Prevents collisions

  • Common with 802.11n/ac/ax protection

RTS/CTS Threshold

Only frames larger than X bytes trigger RTS/CTS.
Common threshold around 2347 bytes (effectively disabling unless needed).


🟢 What Cisco Wants You to Know for CCNA

Here are the precise exam-level lines:

✔ Wi-Fi uses CSMA/CA, not CSMA/CD

(Ethernet detects collisions; Wi-Fi avoids them.)

✔ RTS/CTS is used to prevent collisions, especially in hidden-node scenarios.

✔ RTS/CTS adds overhead and reduces throughput.

(So it's only used when needed.)

✔ CTS-to-self is a faster protection mechanism used by modern APs/clients.

✔ RTS/CTS modifies the NAV (Network Allocation Vector), causing other stations to defer transmission.


🔵 Simple Visualization

Without RTS/CTS (hidden node):
A → AP
B → AP
A cannot hear B → collision at AP

With RTS/CTS:
A → RTS → AP
AP → CTS → ALL CLIENTS
A sends data collision-free

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

LWAPP (Lightweight Access Point Protocol)

  LWAPP was Cisco’s original tunneling + control protocol used between lightweight APs and a Wireless LAN Controller (WLC) before CAPWAP bec...