CH 8 Flashcards

1
Q

uses the Internet Key Exchange (IKE) protocol to negotiate and establish secured siteto-site or remote-access VPN tunnels

A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IPsec uses two different protocols to encapsulate the data over a VPN tunnel:

A

ESP and AH
(Encapsulation Security Payload) & (Authentication Header)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the difference between transport and tunnel mode

A

transport mode protects the upper layer protocols like UDP/TCP, tunnel mode protects the entire IP packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the VPN peers dynamically discover whether an address
translation device exists between them. If they detect a NAT/PAT device, they use UDP port
4500 to encapsulate the data packets, subsequently allowing the NAT device to successfully
translate and forward the packets.

A

NAT-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

provides a simple mechanism to encapsulate packets of any protocol (the payload packets) over any other
protocol (the delivery protocol) between two endpoints

A

GRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DMVPN is based on this mode
and uses a single interface on each hub as well as on each spoke to terminate all static and
dynamic tunnels.

A

mGRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is a technology created by Cisco that aims to reduce the hub router configuration.

A

DMVPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DMVPN also uses …….., which is a client and server protocol (the hub is the server and the spokes are the clients). The hub (or server) maintains a database of the public interface addresses of the each spoke. Each spoke registers its
real address when it boots and queries the database for real addresses of the destination spokes to build direct tunnels.

A

NHRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

combines the keying protocol Group Domain of Interpretation (GDOI)
and IPsec.

A

GETVPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IKEv2-based solution that provides
several benefits beyond traditional site-to-site VPN implementations

A

FlexVPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

only client supported on endpoint devices for remote VPN connectivity to Cisco FTD devices

A

anyconnect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly