13 - Understanding Virtual Private Networks and Interfaces Flashcards

1
Q

What are the 3 types of site-to-site VPN topology?

A

Individual point to point tunnels
Hub and spoke
Full mesh
In addition you could have more complex combinations such as partial mesh, tiered hub and spoke or joined hub and spoke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some characteristics of site to site VPNs?

A
  • Connects sites as replacement for WAN
  • Use peer (site) auth and cryptographic path protection
  • Require basic network traffic controls
  • Frequently use IPsec for cryptographic security services
  • Often work over controlled networks (MPLS) or internet backbones
  • Often require HA and performance guarantee (QoS)
  • Can be configured to function in several different ways
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IPsec combines these protocols into a cohesive security framework.

A
  • IKE/IKEv2
  • AH
  • ESP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does IKE/IKEv2 do?

A

Provides a framework for policy negotiation and key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does AH do?

A

o Provides encapsulation for authentication of user traffic.
o Provides data integrity, data origin authentication, and protection again replay of user traffic
o No encryption is provided
o Mostly obsolete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does ESP do?

A

o Provides an encapsulation for encryption and authentication of user traffic.
o Provides data integrity, data origin authentication, protection against replays, and confidential
o Offers data encryption
o Preferred over AH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IPSec provides IP ___ and defines a new set of headers to be added to IP datagrams

A

network layer encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You can use __ and __ independently or together, although for most applications, just one of them is sufficient (__ is preferred, __ is considered obsolete)

A

AH, ESP, ESP, AH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

__ is not supported on the Cisco ASA security appliance

A

AH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Both AH and ESP use____ and a major function of IKE is to establish and maintain ___.

A

security associations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A __ is a simple description of current traffic protection parameters (algorithms, keys, traffic specification, and so on) that you apply to specific user traffic flows

A

security association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AH or ESP provides __ ___ to a security association

A

security services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If AH or ESP protection is applied to a traffic stream, ___ security associations are created to provide protection to the traffic stream

A

two or more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To secure typical, bi-directional communication between two hosts or between two security GWs, ___ are required.

A

two security associations (one in each direction)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the features of IKE?

A
  • Hybrid protocol
  • Uses parts of several other protocols (ISAKMP, Oakley, skeme) to automatically establish a shared security policy and authenticated keys for services that require keys such as IPsec
  • Creates an authenticated, secure connection between two entities, then negotiates security associations on behalf of the IPsec stack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the benefits of implementing IKE in IPsec configuration?

A
  • Scalability
  • Manageable manual configuration
  • Security association characteristics negotiation
  • Automatic key generation
  • Automatic key refresh
17
Q

What are the two encryption modes supported by IPsec?

A

transport mode, tunnel mode

18
Q

What are the features of transport mode?

A
  • encrypts only the data portion (payload) of each packet
  • leaves the packet header untouched
  • Applicable to either GW or host implementations
  • Provides protection for upper layer protocols and selected IP header fields
19
Q

What are the features of tunnel mode?

A
  • More secure than transport mode because it encrypts the payload and the header
  • IPsec in tunnel mode is normally used when the destination of a packet is different than the security termination point
  • Also used in cases when the security is provided by a device that did not originate packets, as in the case of VPNs
  • Often uses in networks with unregistered IP addresses
  • Unregistered address can be tunnelled from one GW encryption device to another by hiding the unregistered address in the tunnelled packet
20
Q

When configuring IPsec peers must agree on an __ policy

A

ISAKMP

21
Q

An ISAKMP policy should include:

A
  • An authentication method, to ensure the identity of the peers
  • An encryption method, to protect the data and ensure privacy
  • A Hashed message authentication code (HMAC) method to ensure the identity of the sender, and ensure the message has not been modified in transit
  • A Diffie-hellman group to determine the strength of the encryption-key-determination algorithm. The security appliance uses this algorithm to derive the encryption and hash keys
  • A limit to the time the security appliance uses an encryption key before replacing it
22
Q

What are the features of a Cisco IPsec VTI (virtual tunnel interface) VPN?

A
  • A tool that customers can use to configure IPsec-based VPNs between site to site VPNs
  • Provides a designated pathway across a shared WAN
  • Encapsulates traffic with new packet headers
  • Provides true confidentiality (as does encryption) and can carry encrypted data
23
Q

What are the features of DMVPN?

A
  • Cisco solution for building scalable IPsec VPNs
  • Uses centralised architecture to provide easier implementation
  • Allows branch locations to communicate direction with each other over the public WAN or internet, but does not require a permanent VPN connection between sites
  • Enables zero-touch deployment of IPsec VPNs and improves network performance by reducing latency and jitter, while optimised BW utilisation
24
Q

What are the features of Cisco IOS FlexVPN?

A

• Flexibility in Transport network – can be deployed either over a public internet or a private MPLS vpn network
• Easy deployment style – it is designed for the concentration of both site-to-site VPN and remote access VPN. One single FlexVPN deployment can accept both types of connection requests at the same time
• Failover redundancy – three different types of redundancy model can be implemented with FlexVPN
o Dynamic route protocols over FlexVPN tunnels. Path/head-end selection is based on dynamic routing metrics
o IKEv2 based dynamic route distribution and server clustering
o IPsec/IKEv2 active/standby stateful failover between two chassis
• Third party compatibility – Provides compatibility with any IKEv2 based 3rd party VPN vendors, including native VPN clients from Apple iOS and Android devices
• IP multicast support – natively supports IP multicast in two ways
o FlexVPN hub router replicates IP Multicast packets for each spoke
o If the transport network supports native IP multicast, the FlexVPN hub router can choose to have the transport network do multicast packet replication after IPsec encryption
• Superior QoS – easily allows hierarchical QoS to be integrated at the tunnel or per SA (security association) basis
o Per tunnel QoS for each spoke at the FlexVPN hub router
o Per tunnel QoS dynamically applied to the direct traffic between spokes
• Centralised policy control – VPN dynamic policies such as split-tunnel, encryption network policy, VRF selection, DNS server can be fully integrated with the AAA/RADIUS server and applied per-peer basis
• VRF awareness – can be fully integrated with MPLS VPN networks for service provider type of deployment. Both inside vrf and front door VRF are support

25
Q

IPsec ___ simplifies the configuration process when you must provide site-to-site VPNs

A

VTIs

26
Q

Replaces cryptographic map-based configurations, and intuitive to configure and better with Cisco IOS software features

A

VTIs

27
Q

What are the features of VTIs?

A
  • They behave as regular tunnels, one for each remote site of the VPN
  • Their encapsulation must be either ESP or AH
  • Their line protocol depends on the state of the VPN tunnel (IPsec Security Associations)
28
Q

What are some benefits of an Ipsec VTI

A
  • Simplified configuration – can use virtual tunnels to configure ipsec peering
  • Flexible interface feature support – an encapsulation that uses its own cisco ios software interface
  • Multicast support – securely transfer multicast traffic such as voice and video
  • Improved scalability – fewer established SAs to cover different types of traffic, both unicast and multicast, thus improving scalability
  • Provides a routable interface – natively support all types of ip routing protocols
29
Q

What are some limitations of VTIs?

A
  • Limited to only IP unicast and multicast traffic, as opposed to GRE tunnels which have a wider, multiprotocol application
  • IPsec stateful failover is not supported, however can use alternative failover methods such as dynamic routing protocols to achieve similar functionality
30
Q

What are the guidelines when deploying VTI-based site-to-site IPsec VPNS?

A
  • Use VTI-based site t site VPNs as the default IPsec technology for point-to-point and hub and spoke VPNs
  • Consider deploying DMVPN or Group Encrypted Transport (GET VPn) for larger environments with partial or fully meshed VPN requirements
31
Q

How would you configure basic IKE peering using pre-shared keys? (not config)

A

• First task for deploying VTI-based point-to-point IPsec VPNs involves setting up an IKE security association between two peers
o Using PSKs for mutual auth
o An encryption and hashing algorithm to guarantee confidentiality and integrity
o Using a DH exchange of an appropriate strength
o Using appropriate session lifetimes
• Requires you to create a PSK and bind it to the name or IP address of the VPN peer

32
Q

How do you configure IKE peering? (config)

A
  • Crypto isakmp policy 10 – creates a new IKE policy
  • Authentication pre-share – specifies PSKs for authentication
  • Hash sha – sends hash algorithm
  • Encr aes 128 sets encryption algorithm
  • Group 14 – sets DH groups for key exchange
  • Lifetime 3600 – configures a lifetime
  • Crypto isakmp key wqednf0jqfoq09249iv address 172.17.2.24 creates a random, long psk and bits it to the IP address of the peer
33
Q

How do you display parameters of each local IKE policy?

A

show crypto isakmp policy

34
Q

How do you verify the status of the IKE peering SAs

A

show crypto isakmp sa

35
Q

How do you configure static VTI point-to-point tunnels?

A

Create IKE policy:
R2(config)# crypto isakmp policy 10
R2(config-isakmp)# authentication pre-share
R2(config-isakmp)# hash sha
R2(config-isakmp)# encryption aes 128
R2(config-isakmp)# group 14
R2(config-isakmp)# lifetime 3600
Create a PSK and bind it to IP address of other end of tunnel address:
R2(config)# crypto isakmp key cisco address 172.18.4.2
Create transform set to determine the encryption and data authentication has for the IPsec SA. This must match an equal policy on peer:
R2(config)# crypto ipsec transform-set MYSET esp-aes 128 esp-sha-hmac
Create IPsec profile, and include transform set in the profile:
R2(config)# crypto ipsec profile MYPROFILE
R2(ipsec-profile)# set transform-set MYSET
Create tunnel interface and specify source and destination:
R2(config)# interface Tunnel0
R2(config-if)# ip unnumbered Ethernet0/0
R2(config-if)# tunnel source Ethernet0/0
R2(config-if)# tunnel destination 172.18.4.2
Specify IPsec as tunnel encapsulation, and traffic protection policy by referencing the configured IPsec profile:
R2(config)# interface Tunnel0
R2(config-if)# tunnel mode ipsec ipv4
R2(config-if)# tunnel protection ipsec profile MYPROFILE

36
Q

How do you verify status of ipsec SA?

A

show crypto ipsec sa

37
Q

How do you verify the status of tunnel interface?

A

show interface tunnel 0