Chapter 17 - Fundamentals of VPN Technology Flashcards

1
Q

What are the two main types of VPNs?

A
  • Remote Access VPN - Can be over IPSec or SSL, usually for individual computers that are connecting to corporate networks.
  • Site to Site VPN - Connecting together two or more sites using IPSec over the Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is one fundamental way that IPSec and SSL differ when it comes to VPN?

A

SSL implements security of TCP sessions at Layer 4. Can be used for remote access VPNs and for securing web traffic via HTTPS

IPSec implements security of IP packets at Layer 3 and can be used for site-to-site VPNs in addition to remote access VPNs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What command would you use to see the MD5 digest of an IOS image file?

A

verify /md5 flash:/c2800nm-mz.123-24-t4.bin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does antireply help secure VPN traffic?

A

Once a VPN packet has been sent and accounted for, that exact same VPN packet is not valid the second time in the VPN session. This helps prevent anyone capturing packets from trying to build a VPN by replaying the packets over again to a remote peer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a symmetrical encryption algorithm?

A

It is any encryption techonology that uses the same key or keys for both encryption and decryption of data.

Examples of symmetric algorithms are:

AES - Advanced Encryption Standard

DES - Digital Encryption Standard

3DES - Triple Digital Encryption Standard

IDEA - International Data Encryption Algorithm

Blowfish

RC2, RC4, RC5, RC6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the minimum key length that is considered “safe” for a symmetrical encryption algorithm?

A

The key length should always be at LEAST 80 bits.

128 bits is pretty standard.

More bits used = better encryption = more CPU utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When are Asymmetric key pairs generally used?

A

Asymmetric key pairs are commonly used for things such as authenticating VPN peers, or generating keying material that could be used for symmetrical algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Hash?

A

A cryptographic hash function is a process that takes a block of data and creates a small fixed-sized hash value.

This is used for Data Integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When a hash function is run on data, what is the resulting string called?

A

It is called either a Digest, message digest, or “the hash”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 3 popular types of hashes?

A

MD5 (message digest 5) - creates a 128-bit digest.

SHA-1 (Secure Hash Algorithm 1) - creates a 160-bit digest

SHA-2 (Secure Hash Algorithm 2) - options include hash between 224-bits and 512-bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a certificate authority (CA) used for?

A

A certificate authority (CA) is a trusted entity that hands out digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should you think of when you see the term “rsa-signatures”?

A

rsa-signatures are asocated with using digital certificates for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a keyspace?

A

Keyspace refers to all the possible key values for a key. The bigger the key, the more secure the algorithm will be. Extremely long keys will cause increased CPU usage for the encryption and decryption of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Diffie-Hellman key exchange?

A

Diffie-Hellman key exchange uses a pubic-private key pair algorithm, but creates shared secret keys that are used by symmetrical algorithms in an IPSec connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is Hashed Message Authentication Code (HMAC) more secure than a standard hash?

A

HMAC uses keys so that a hash value can not be checked without the secret key. This way not just anyone can perform the hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Diffie-Hellman actually used for?

A

DH uses a public-private key pair to asymmetrically create shared secrets (new keys) that are then used my symmetrical algorithms to pass data over a VPN quickly and with low overhead.

These keys are used by DES, 3DES, AES, IDEA

17
Q

How does the MD5 Algorithm create a hash?

A

It takes a variable-length message and creates a 128bit message digest.

18
Q

What configurations can SSL and IPSec be used for VPN’s on Cisco ISR’s and ASA’s?

A

SSL clentless remote-access VPN’s

SSL full-tunnel client remote-access VPN’s

IPsec site-to-site VPNs

IPsec client remote-access VPNs

(NOTE: No SSL site-to-site VPNs!)