Chap 16 - Overlay Tunnels Flashcards
What is an Overlay network?
A logical or virtual network built over a physical transport network.
What is the physical network called.
An underlay network.
What are Overlay Networks for?
They are used to overcome shortcomings of traditional networks by enabling network virtualization, segmentation, and security to make traditional networks more manageable, flexible, secure (by means of encryption), and scalable.
What are 5 examples of Overlay Networks?
- GRE Tunnels
- IPSec
- Location ID/Separation Protocol (LISP)
- Virtual Extensible LAN (VXLAN)
- Multiprotocol Label Switching (MPLS)
What is the most common VPN encryption suite?
IPSec
Can an Overlay Tunnel be built over another overlay tunnel?
Yes, MPLS over GRE over IPSEC
What are 4 examples of next generation overlay fabric networks?
- Software Defined WAN (SD-WAN)
- Software Defined Access (SD-Access)
- Application Centric Infrastructure (ACI)
- Cisco Virtual Topology System (VTS)
What routing problem can cause a GRE tunnel not to come up?
Having no route to the tunnel destination.
For a GRE tunnel why use keepalives?
To ensure that bidirectional communication exists, otherwise you have to depend on the routing protocol timers to detect a dead remote endpoint.
For a GRE tunnel why specify the MTU, and what should it be?
- GRE will add a 24 byte header to each packet.
- It should be no greater than 1476 bytes
What size tunnel header will be added with DES/3DES IPSec (transport mode)?
18-25 bytes
What size tunnel header will be added with DES/3DES IPSec (tunnel mode)?
38-45 bytes
What size tunnel header will be added with GRE + DES/3DES?
42-49 bytes
What size tunnel header will be added with GRE + AES + SHA-1?
62-77 bytes
When running OSPF what kind of route will the tunnel route show up as?
Inter-area route
What is the default TTL for a GRE tunnel?
255
What is the Recursive Routing problem that can occur over a GRE tunnel?
- Internet-facing network gets added into IGP routing table
- Since Internet-facing route is more specific the routing protocol would try to use that route.
- It can’t because the public network isn’t reachable from inside the tunnel.
- Tunnel goes down
- Recovers when it sees less specific default route
- Once back up the routing protocol finds the more specific route again and tunnel bounces again.
How do you fix Recursive Routing over GRE?
Remove the Internet-facing route from the routing protocol.
What is IPSec?
It is a framework of open standards for creating highly secure VPNs using various protocols and technologies for secure communication across unsecure networks, such as the Internet.
What 4 services does IPSec provide?
- Peer authentication
- Data confidentiality
- Data integrity
- Replay detection
What 2 methods does IPSEC use to provide peer authentication?
- Pre-shared Key
- Digital certificates
What are 3 tools IPSEC uses to provide Data Confidentiality?
- Data Encryption Standard (DES)
- Triple DES (3DES)
- Advanced Encryption Standard (AES)
What 2 methods does IPSEC use to provide Data Integrity?
- HMAC function using MD5
- HMAC function Secure Hash Algorithm (SHA)
What methods does IPSEC use to provide Replay Detection?
- Marks every packet with a unique sequence number
- VPN device keeps track of sequence numbers
- Does not accept a packet with a sequence number it has already seen
What are the 2 different packet headers IPSEC uses to deliver IPSec services?
- Authentication Header (AH)
- Encapsulated Security Payload (ESP)
In IPSec what does the Authentication Header provide?
- Data integrity
- Authentication
- Replay protection
How does IPSec’s Authentication Header ensure the packet has not been modified, what does it not support and what is the IP protocol number?
- Creates a digital signature similar to a checksum to ensure the packet has not been modified
- Does not support Encryption or NAT Traversal (NAT-T) so it is NOT recommended
- Uses IP protocol 51
What 4 things does Encapsulated Security Payload (ESP) provide?
- Data confidentiality
- Data integrity
- Authentication
- Replay protection
How does ESP provide data confidentiality, what does it add, what protocol number and what else does it support?
- Encrypts the payload (original packet)
- Adds a new set of headers
- Uses IP protocol 50
- Does support encryption and NAT Traversal (NAT-T)
What 2 modes of packet transport does IPSec provide?
- Tunnel mode
- Transport mode
What 3 things does IPSec Tunnel Mode do?
- Encrypts the entire packet
- Adds new IPSec headers
- Performs the Overlay Function
What is the difference between IPsec tunnel mode vs. transport mode?
What does 2 things does tunnel mode do that transport mode does not?
- Tunnel mode encrypts the entire original packet, transport mode does not.
- Tunnel mode performs an overlay function, transport mode does not.
What is Data Encryption Standard (DES)?
- A 56-bit symmetric data encryption algorithm that can encrypt the data sent over a VPN.
What is Triple DES (3DES) and how is it different from DES?
- data encryption algorithm
- Runs the DES algorithm three times with three different 56-bit keys
What is Advanced Encreption Standard (AES), what was it developed to replace, what 3 key lengths are supported and what algorithm is it based on?
- data encryption algorithm
- was developed to replace DES and 3DES
- AES supports key lengths of 128 bits, 192 bits, or 256 bits
- based on the Rijndael algorithm
What is Message Digest 5 (MD5)
How many bits?
What 2 things is it used for?
- One-way, 128-bit hash algorithm
- Used for data integrity and preventing MitM attacks
What is Secure Hash Algorithm (SHA) and what 3 things is it used for?
- One-way, 160-bit hash algorithm
- Used for data integrity, data authentication, and preventing MitM attacks
What is Diffie-Hellman (DH), what does it enable, and how CPU intensive is it?
- An asymmetric key exchange protocol
- Enables two peers to establish a shared secret key used by encryption algorithms such as AES
- The DH key exchange is very CPU intensive
What is a Diffie-Hellman Group?
What does the term Diffie-Hellman Group refer to?
What makes it more or less secure?
What does Cisco recommend?
- Refers to the length of the key (modulus size) to use for a DH key exchange
- The larger the modulus, the more secure it is
- Cisco recommends DH group 14 or higher
What does Diffie-Hellman (DH) generate?
To generate a shared secret symmetric key that is used by both VPN peers for symmetrical algorithms, such as AES
What are RSA Signatures?
A public-key (digital certificates) cryptographic system used to mutually authenticate the peers.
What is a Pre-shared Key (PSK)?
A security mechanism in which a locally configured key is used as a credential to mutually authenticate the peers.
What is a Transform Set and how is it used?
- A combination of security protocols and algorithms
- Peers agree on which transform set to use during SA negotiation
What are 5 Authentication Header transform sets?
- ah-md5-hmac
- ah-sha-hmac
- ah-sha256-hmac
- ah-sha384-hmac
- ah-sha512-hmac
What are the 12 ESP encryption transforms?
- esp-null
- esp-des
- esp-3des
- esp-aes
- esp-aes 192
- esp-aes 256
- esp-gcm
- esp-gmac
- esp-md4-hmac
- esp-sha-hmac
- esp-seal
- comp-lzs