Day 7 - VPN and IPsec Flashcards
A __________ __________ __________ is an encrypted connection between private networks over a public network such as the internet
Virtual Private Network (VPN)
Instead of using a dedicated __________ _____ connection such as a leased line, a __________ uses virtual connections called __________ ___________
Layer 2
VPN
VPN tunnels
What are the 4 benefits of a VPN?
Cost savings
Security
Scalability
Compatibility with broadband technology
What are some types of VPN access methods?
Site-to-Site VPN
Remote access VPN
GRE (Generic Routing Encapsulation
DMVPN (Dynamic Multipoint VPN)
Solve for the type of VPN access method:
These types of VPNs connect entire networks to each other. For example, this type of VPN can connect a branch office network to a company HQ network
Site-to-Site VPN
Solve for the type of VPN access method:
This type of VPN access method enables individual hosts such as telecommuters, mobile users and extranet consumers to access a company network securely over the internet. Typically uses a client based VPN connection
Remote-access VPN
Solve for the type of VPN access method:
A standard IPsec VPN that is a non-secure site-to-site VPN tunneling protocol can support multicast and broadcast traffic needed for network layer protocols.
GRE (Generic routing encapsulation)
Does GRE support encryption by default?
No
Solve for GRE terms regarding the encapsulation process
__________ ___________ for the routing protocol
__________ ___________ for GRE
__________ ___________ for IPsec
Passenger protocol
Carrier protocol
Transport protocol
Solve for the type of VPN access method:
Cisco proprietary solution for building many VPNs in an easy, dynamic, and scalable manner. Allows a network administrator to dynamically form hub-and-spoke tunnels and spoke-to-spoke tunnels
DMVPN (Dynamic Multipoint VPN)
What two tunnels are there for DMVPN?
Hub-to-Spoke tunnels
Spoke-to-Spoke tunnels
What technologies does DMVPN utilize?
NHRP (Next hop redundancy protocol)
IPsec encryption
mGRE
VTI
Service Provider MPLS
VPNs secure data by __________ and __________ it
Encapsulating
Encrypting
Encapsulation is also known as __________
Tunneling
VPN tunneling uses 3 classes of protocols. What are they?
Carrier protocol
Encapsulating protocol
Passenger protocol