Chapter_7 part 1 Flashcards
what is a GRE?
GRE= Generic Routing Encapsulation:
cisco tunneling protocol, encapsulates a wide variety of network protocols into an ip tunnel.
what is the point of GRE?
GRE= Generic Routing Encapsulation : creates a virtual point to point link to cisco routers at remote points over ip networks. encapsulates network layer protocol packets inside IP tunnels.
ASA?
ASA= Adaptive Security Appliance
what is an ASA used for?
ASA= Adaptive Security Appliance:
is a firewall that combines firewall, VPN concentration and intrusion prevention into one software image.
how does a site to site connection work? what is it?
a VPN connection between 2 or more sites over the internet. each site has a vpn terminating device (VPN gateway) on the edge of the network. the internal hosts do not know about the vpn connection and use regular TCP/IP communication.
what are: Remote Access VPN’s?
a VPN used by a telecommuter to connect to a corp. network. the user needs vpn software and the corp. network needs a VPN gateway at its edge of the network.
GRE header contains?
24 bytes additional- used for tunneling overhead, stateless= no flow control mechanisms, has flag field for optional header fields , protocol type indicator.
what are the GRE steps to configure a tunnel?
1- admin needs ip’s of endpoints
2- create a tunnel interface using correct command
3- specify the tunnel source ip address
4- specify the tunnel destination (physical ip address of destination router)
5- configure ip address for the tunnel interface (this is the network for the tunnel with subnet mask.)
what does IPsec provide? what 3 standards/services?
Data confidentiality, integrity and authentication.
what layer of the tcp/ip model does IPsec work on?
layer 3 (packets)
IKE?
IKE: internet Key exchange- used by ipsec to authenticate users/ devices.
PSK?
PSK: Preshared Key- used by internet key exchange authentication for ipsec for the authentication process.
CIA?
CIA: Confidentiality, Integrity and Authentication
anti-replay protection?
ipsec: detects and rejects replayed (duplicated packets) to protect against spoofing.
EFT
EFT: electronic Funds Transfer