13.8 Virtual Private Networks and Remote Switch Access Flashcards

1
Q

Describe VPN

A

allows a remote user to connect to needed resources. VPNs accomplish this by using already-established internet connections. Data that flows across an internet connection is generally not secure. All data that flows across the VPN is encrypted and repackaged. This is why processes on VPN connections are sometimes referred to as tunneling protocols. Many users also use VPN connections on their personal internet connections to surf the internet anonymously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe Point-to-Point Tunneling Protocol

A

Is the oldest and most-used tunneling protocol.
Was developed by Microsoft for use with dial-up networks.
Uses 128-bit encryption, but is very easy to break due to its old age.
Is one of the faster protocols because of its low encryption standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe Layer 2 Tunneling Protocol with internet Protocol Security (L2TP/IPsec)

A

Was developed by Microsoft and Cisco in the 1990s.
Pairs L2TP with IPsec to make it one of the more secure VPN methods.
Is slower than PPTP due to higher encryption standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe Secure Socket Tunneling Protocol (SSTP)

A

Was developed by Microsoft with the release of Windows Vista. Comes loaded and configured in all later Windows. versions.
Is usually paired with the Advanced Encryption Standard (AES).
Is used only by Windows, so it is not compatible with other operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe Internet Key Exchange v2 (IKEv2)

A

Is a unique tunneling protocol that reconnects a dropped connection. This protocol is often used by mobile devices because of this feature.
Was developed by Microsoft and Cisco.
Is one of the fastest and most secure protocols available.
Is not compatible with many operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe OpenVPN

A

Was released in 2001.
Is an extremely configurable open-source protocol. OpenVPN can be set up to use many different ports and encryption methods.
Is used by many third-party VPN providers.
Is extremely secure when configured properly and about as fast as L2TP/IPsec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe Remote Access VPN

A

A remote access VPN lets remote and mobile users connect to the organization network securely. Remote access VPNs:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Desrcibe SSL VPN

A

SSL uses the public key infrastructure (PKI) and digital certificates to authenticate peers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe Site-tosite IPsec VPNs

A

Site-to-site VPNs connect networks across an untrusted network such as the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe GRE over IPsec (GRE)

A

Generic Routing Encapsulation is an unsecure site-to-site VPN tunneling protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe Dynamic Multipoint VPNs

A

When an organization needs to add more sites, other VPN types may not be sufficient. Dynamic Multipoint VPN (DMVPN) is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe IPsec Virtual Tunnel Interface

A

IPsec Virtual Tunnel Interface (VTI) simplifies the configuration process required to support multiple sites and remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe Service Provider Multi-Protocol Label Switching (MPLS) VPNs

A

Many VPN service providers utilize MPLS in their core networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is IPsec

A

an IETF standard that defines how a VPN can be secured across IP networks. IPsec protects and authenticates IP packets between source and destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the Authentication Header Protocol

A

AH provides integrity and authentication.
AH provides a message integrity check with the Keyed-hash Message Authentication Code (HMAC). With HMAC, a symmetric key is embedded into a message before the message is hashed. When the message is received, the recipient’s symmetric key is added back into the message before hashing the message. If the hash values match, message integrity is proven.

AH uses Secure Hashing Algorithm 1 (SHA-1) or Message Digest v5 (MD5) for integrity validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the Encapsulating Security payload (ESP) Protocol

A

ESP provides encryption, integrity, anti-replay, and a weak form of authentication.

17
Q

Describe the internet key exchange (IKE)

A

IKE negotiates the connection. As two end points are securing an IPsec network, they have to negotiate a Security Association (SA). An inbound and outbound SA is necessary for each connection with a remote endpoint.

18
Q

Describe Tunnel mode

A

Tunnel mode is used for site-to-site communications:
Tunnel mode is often referred to as subnet-to-subnet.
The entire data packet, including original headers, is encapsulated in a new packet when using IPsec in tunnel mode.
The new packet has a new unencrypted Layer 2 and Layer 3 header that contains the endpoint addresses and all necessary AH and ESP information.
The VPN server acts as a gateway by providing encryption support for other devices on the LAN.

19
Q

Describe Transport Mode

A

Transport mode is used for end-to-end (or host-to-host) data encryption:
The end communicating devices are the tunnel endpoints.
The packet data is encrypted, but the header is left intact, allowing intermediary devices (such as routers) to examine the packet header and use the information in routing packets.
Transport mode operates at Layer 4, encrypting from level four and up.