Encryption Flashcards
What is Symmetric and Asymmetric Encryption?
In symmetric encryption, a single key is used both to encrypt and decrypt traffic. It is also referred as shared key or shared secret encryption. Symmetric encryption algorithms include DES, 3DES, AES.
In Asymmetric encryption two keys are used to encrypt and decrypt traffic, one for encryption and one for decryption. The most common asymmetric encryption algorithm is RSA.
Define Digital Signatures?
Digital signature is an attachment to an electronic message used for security purposes. It is used to verify the authenticity of the sender.
What are the 3 protocols used in IPSec?
- Authentication Header (AH).
- Encapsulating Security Payload (ESP).
- Internet Key Exchange (IKE).
Explain IPsec Protocol Headers?
1.<u>Encapsulating Security Payload (ESP) - It is an IP-based protocol which uses Protocol 50 in the IP header. ESP is used to protect the confidentiality, integrity and authenticity of the data and offers anti-replay protection.
Drawback - ESP does not provide protection to the outer IP Header</u>
- Authentication Header (AH) - It is also an IP-based protocol that uses Protocol 51in the IP header. AH is used to protect the integrity and authenticity of the data and offers anti-replay protection.
Unlike ESP, AH provides protection to the IP header also.
Drawback - AH does not provide confidentiality protection.</u>
How ESP & AH provides anti-replay protection?
Both ESP and AH protocols provide an anti-reply protection based on sequence numbers. The sender increments the sequence number after each transmission, and the receiver checks the sequence number and reject the packet if it is out of sequence.
At what layer IPsec works?
IPsec secures IP traffic at the Layer 3 (Network Layer) of the OSI model.
Name a major drawback of IPSec?
IPSec only supports unicast IP traffic.
What is IPSec VPN?
IP Security Protocol VPN means VPN over IP Security. It allows two or more users to communicate in a secure manner by authenticating and encrypting each IP packet of a communication session. IPsec provides data confidentiality, data integrity and data authentication between participating peers.
What is Authentication, Confidentiality Integrity?
Authentication - Verifies that the packet received is actually from the claimed sender. It verifies the authenticity of sender. Pre-shared Key, Digital Certificate are some methods that can be used for authentication.
Integrity - Ensures that the contents of the packet has not been altered in between by man-in-middle. Hashing Algorithm includes MD5, SHA.
Confidentiality - Encrypts the message content through encryption so that data is not disclosed to unauthorized parties. Encryption algorithms include DES (Data Encryption Standard), 3DES (Triple-DES), AES (Advanced Encryption Standard).
At what protocol does IKE works?
IKE uses UDP port 500.
Where does the ESP header go in relation to the IP header?
The ESP header is inserted after the IP header and before the next layer protocol header (transport mode) or before an encapsulated IP header (tunnel mode).
Describe Tunnel mode
IPSec tunnel mode is thedefault mode. With tunnel mode, the entire original IP packet is protected by IPSec. This means IPSec wraps the original packet, encrypts it, adds a new IP header and sends it to the other side of the VPN tunnel (IPSec peer).
Tunnel modeis most commonly used between gateways (Cisco routers or ASA firewalls), or at an end-station to a gateway, the gateway acting as a proxy for the hosts behind it.
Tunnel mode is used to encrypt traffic between secure IPSec Gateways, for example two Cisco routers connected over the Internet via IPSec VPN.
Describe ESP vs AH Protocols
In tunnel mode, an IPSec header (AHorESP header) is inserted between the IP header and the upper layer protocol. Between AH and ESP, ESP is most commonly used in IPSec VPN Tunnel configuration.
How is ESP distinguished in the IP header?
ESP is identified in theNew IP headerwith an IPprotocol IDof 50.
How is AH distinguished in the IP header?
AH is identified in theNew IP headerwith an IPprotocol IDof51.
How does one get Multicast across an IPsec VPN?
GRE TunnelWithMulticast Support. Generic Routing Encapsulation (GRE)isa tunneling protocol developed by Cisco andiswidely used for IP-to-IP tunneling. Since itcanencapsulate all kinds of IP traffic,GRE canbe used to transportmulticasttraffic over networks that have no multicast support.
Explain how IKE/ISAKMP Phase 1 Works?
IKE is a two-phase protocol-
Phase 1
IKE phase 1 negotiates the following:
1.It protects the phase 1 communication itself (using crypto and hash algorithms).
2.It generates Session key using Diffie-Hellman groups.
3.Peers will authenticate each other using pre-shared, public key encryption, or digital signature.
4.It also protects the negotiation of phase 2 communication.
What are the parts of IKE v1 Phase 1
HAGLE
Hashing
Authentication
(Group) Diffie-Hellman group
Lifetime
Encryption
What are the components of a crypto map?
Configure the crypto map, which contains these components:
The peer IP address
The defined access list that contains the traffic of interest
The Transform Set
An optional Perfect Forward Secrecy (PFS) setting, which creates a new pair of Diffie-Hellman keys that are used in order to protect the data (both sides must be PFS-enabled before Phase 2 comes up)
On a Cisco ASA what command need to be inplace so that VPN traffic can bypass the Outside interface ACL?
Since we have the command
“sysopt connection permit-vpn”
enabled on an ASA means VPN traffic will bypass the Outside interface ACL, and an explicit ACL is not needed for the Inbound VPN traffic, even though the VPN traffic from a 3rd party is coming Inbound to us.
The crypto map once created get applied to what?
outside interface
On an ASA what is the command to verify Phase 1 is working, from the CLI?
show crypto isakmp sa
Active SA: 1
Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 1
1 IKE Peer: 172.16.1.1
Type : L2L Role : initiator
Rekey : no State : MM_ACTIVE
On an ASA what is the command to verify Phase 2 is working, from the CLI?
Phase 2 = IPSec
show crypto ipsec sa
command shows the IPsec SAs that are built between the peers.
You can see the two ESP SAs built for the inbound and outbound traffic.
In ASA ver 8.4 and above what is the command to debug Phase 1
debug crypto ikev1 127 (Phase 1)