13 - Understanding Virtual Private Networks and Interfaces Flashcards
What are the 3 types of site-to-site VPN topology?
Individual point to point tunnels
Hub and spoke
Full mesh
In addition you could have more complex combinations such as partial mesh, tiered hub and spoke or joined hub and spoke
What are some characteristics of site to site VPNs?
- Connects sites as replacement for WAN
- Use peer (site) auth and cryptographic path protection
- Require basic network traffic controls
- Frequently use IPsec for cryptographic security services
- Often work over controlled networks (MPLS) or internet backbones
- Often require HA and performance guarantee (QoS)
- Can be configured to function in several different ways
IPsec combines these protocols into a cohesive security framework.
- IKE/IKEv2
- AH
- ESP
What does IKE/IKEv2 do?
Provides a framework for policy negotiation and key management
What does AH do?
o Provides encapsulation for authentication of user traffic.
o Provides data integrity, data origin authentication, and protection again replay of user traffic
o No encryption is provided
o Mostly obsolete
What does ESP do?
o Provides an encapsulation for encryption and authentication of user traffic.
o Provides data integrity, data origin authentication, protection against replays, and confidential
o Offers data encryption
o Preferred over AH
IPSec provides IP ___ and defines a new set of headers to be added to IP datagrams
network layer encryption
You can use __ and __ independently or together, although for most applications, just one of them is sufficient (__ is preferred, __ is considered obsolete)
AH, ESP, ESP, AH
__ is not supported on the Cisco ASA security appliance
AH
Both AH and ESP use____ and a major function of IKE is to establish and maintain ___.
security associations
A __ is a simple description of current traffic protection parameters (algorithms, keys, traffic specification, and so on) that you apply to specific user traffic flows
security association
AH or ESP provides __ ___ to a security association
security services
If AH or ESP protection is applied to a traffic stream, ___ security associations are created to provide protection to the traffic stream
two or more
To secure typical, bi-directional communication between two hosts or between two security GWs, ___ are required.
two security associations (one in each direction)
What are the features of IKE?
- Hybrid protocol
- Uses parts of several other protocols (ISAKMP, Oakley, skeme) to automatically establish a shared security policy and authenticated keys for services that require keys such as IPsec
- Creates an authenticated, secure connection between two entities, then negotiates security associations on behalf of the IPsec stack