Chapter 19 - Fundamentals of IP Security (IPSec) Flashcards

1
Q

How does IPSec enforce anti-replay?

A

IPSec VPN’s automatically use serial numbers on packets that are sent through the tunnel. If a packet arrives with the same serial number as a previous packet, it is dropped because the receiving end belives it has already processed the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which command shows IKE Phase 1 policiess on a router?

A

show crypto isakmp policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which command shows details of a crypto map and the contents of a IKE Phase 2 transform set?

A

show crypto map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What command will show you the details of a IKE Phase 1 tunnel?

A

show crypto isakmp sa detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What command would you use to get more details on a IKE Phase 2 tunnel?

A

show crypto ipsec sa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is another command that will show if IPsec encryption / decryption is working?

A

show crypto engine connections active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How many “tunnels” are actually setup once IPSec is passing VPN traffic on a site to site link?

A

There are actually 3

1 is for IKE Phase one traffic (secure communication between both peers) bi-directional

1 is for outbound traffic from Peer A to Peer B

the other is for inbound traffic from Peer B back to Peer A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two modes that IKE Phase 1 uses to create the management tunnel between peers?

A

Main Mode

Aggressive Mode

Main mode is usually preferred because it is more secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the DH Group encryption key sizes?

A

DH Group 1 = 786 bits

DH Group 2 = 1024 bits

DH Group 5 = 1536 bits

NOTE: there are no DH3 or DH4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does HAGLE stand for when referring to IKE Phase 1 negotiation?

A

H = Hash algorithym (MD5, SHA)

A = Authentication method (PSK or Digital Certs)

G = Diffie-Hellman Group (DH1, DH2, DH5)

L = Lifetime, how long until IKE Phase 1 tunnel should be torn down (seconds or kilobytes)

E = Encryption algorithm (DES, 3DES, AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When referring to HAGLE and IKE Phase 1 setup, which parameter can be different (and still have the tunnel come up)?

A

L or Lifetime. If this is different on each end, the shorter time of the two will be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the mode that IKE Phase 2 tunnel is built called?

A

Quick Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a more proper term for the tunnels that are created by VPN peers?

A

Security Associations (SA)s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the policies used for IKE Phase 2 negotiations called?

A

Transform Sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a crypto ACL?

A

A crypto ACL is used to identify traffic that should be encrypted and sent over a VPN tunnel.

NOTE: crypto ACL’s are not applied directly to interfaces but are referenced by a policy called a crypto map. The crypto map is applied to an interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How would you setup IKE Phase 1 parameters via command line?

A

crypto isakmp policy 1

(1 is the policy number, this can be almost anything)

Once in (config-isakmp) mode you can configure HAGLE options.

(config-isakmp)# authentication pre-share (PSK)

(config-isakmp)# hash md5 (MD5 hashing)

(config-isakmp)# group 5 (Diffie-Hellman Group 5)

(config-isakmp)# lifetime 3600 (tear down tunnel in 1 hr)

(config-isakmp)# encr aes 123 (AES 128 bit encryption)

17
Q

So you setup an IKE Phase 1 policy that is supposed to use PSKs for authentication, how do you setup the actual PSK?

A

Check that your isakmp policy is set to require pre-shared keys.

show crypto isakmp policy

Check where it says authentication method: Pre-shared key

Then in global configuration mode:

(config)#: crypto isakmp key pass123 address 43.0.0.2

This configures a PSK of pass123 to authenticate with the VPN peer at 43.0.0.2

18
Q

How do you configure the IKE Phase 2 tunne parameters for IPSec?

A

(config) # crypto ipsec transform-set MYSET esp-sha-hmac esp-aes 256

The above command would create a transform set called “MYSET” and would require SHA hashing and AES 256 bit encryption.

*** dont forget to enable “tunnel” mode for the IPSec tunnel to actually encrypt and pass traffic on the client’s behalf!

(cfg-crypto-trans)# mode tunnel

19
Q

What two modes will IKE Phase 2 tunnels operate in?

A

Tunnel Mode - this is the most common usage, as in this mode the VPN peer will encrypt and pass packets on the behalf of clients sending through this peer device.

Transport Mode - rarely used, this mode is for when only the two peers themselves (for example two routers) are going to communicate directly with each other).

20
Q

How do you create a crypto map to use an ACL to identify traffic that should be encrypted through the VPN tunnel?

A

(config) # crypto map MYMAP 1 ipsec-isakmp

This creates a map called MYMAP (sequence number 1) and requests the serviecs of ISAKMP

Here’s how to use the ACL to match traffic:

(config-crypto-map)# match address 100 (100 is the extended ACL number)

if the traffic is matched, use this transform set:

(config-crypto-map)# set transform-set MYSET

(config-crypto-map)# set peer 43.0.0.2

21
Q

What does ISAKMP stand for?

A

Internet Security Association Key Management Protocol