Fundamentals of IP Security Flashcards
Which technology is a primary method that IPSec uses to implement integrity?
MD5
What are the source and destination addresses used for an encrypted IPSec packet?
Sending and Receiving VPN gateway’s
Which phase is used for private management traffic between the two VPN peers?
IKE Phase 1
Name four things that are negotiated during IKE Phase 1?
Hashing, DH group, Encryption, Authentication method
What method is used to allow two VPN peers to establish shared secret keys and to establish those kays over an untrusted network?
Diffie-Hellman (DH)
Name three parts of the IKE Phase 1 process?
Negotiation of the IKE Phase 1 protocols, Running DH, Authenticating the peer
How is the negotiation of the IPSec (IKE Phase 2) tunnel done securely?
Uses the IKE Phase 1 tunnel
What are the two main methods for authenticating a peer as the last step of IKE Phase 1?
RSA signatures, using digital certificates to exchange public keys, PSK (Pre-shared key)
Which component acts as an if-then statement, looking for packets that should be encrypted before they leave the interface?
crypto map
What is true about symmetrical algorithms and symmetrical crypto access lists used on VPN peers?
Symmetrical algorithms use the same secret (key) to lock and unlock the data. Symmetrical ACLs between two VPN peers should symmetrically swap the source and destination portions of the ACL.
Which command reveals the ACL, transform sets, and peer information and indicate which interface is being used to connect to the remote IPSec VPN peer?
show crypto map