CCNAS - IPSec and Tunnels Flashcards

1
Q

Phase 1

A
  1. negotiate IKE policy sets
  2. DH Key exchange
  3. verify peer identity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phase 2

A

Used to negotiate IPSec security parameters that will be used to secure the tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IKE

A

protocol that uses UDP 500, exchanges keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISAKMP

A

combined protocols to build secure IPSec connections.

same as IKE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Diffie-Hellman

A

used to initiate a key exchange, public key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

transform sets

A

set of rules that must be similar across devices - Used in Phase 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IKE Phase 1

A
  1. IKE Policy sets exchanged
  2. DH key exchange establishes a a shared secret key
  3. Devices authenticate each other using PSK or RSA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SA (Security Associations)

A

Negotiated parameters between two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IKE Phase 2

A

Negotiates IPSec security parameters (transform sets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPSec VPN Negotiation

A
  1. Determine interesting traffic using crypto acls
  2. IKE Phase 1 begins (ISAKMP creates secure tunnel)
  3. IKE Phase 2 begins (IPSec SA transforms are negotiated - this is how the tunnel will be established)
  4. IPSec tunnel created and data securely transfered
  5. IPSec tunnel terminates when SAs are deleted or expired.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric

A

same key decrypts and encrypts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Asymmetric

A

One Encrypts, another decrypts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Asymmetic: Public Key & Private Key

A

The public key is given to everyone, not the private one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two different types of keys

A

Symmetric and Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phase 1 - Aggressive Mode

A

Faster than traditional exchange, cuts between steps 2 & 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly