IPsec Flashcards

1
Q

Generic Routing Encapsulation (GRE)

A

Encapsulates almost any L3 protocol in a virtual point-to-point link. It’s used for tunneling, but has no other VPN functions on its own; consequently, it’s often just one part of a VPN solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Point-to-Point Tunneling Protocol (PPTP)

A

A basic VPN protocol initially developed by a vendor consortium. It encapsulates PPP packets over GRE to provide VPN tunneling features, but it relies on vendor implementation to provide encryption and authentication. Most widely supported PPTP implementations, such as Microsoft’s, aren’t very secure; you shouldn’t use it when other alternatives are available. PTTP can be applied seamlessly to all sorts of network traffic, but its control functions require TCP port 1723 and GRE port 47 to be open on the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

L2TP/IPsec

A

Layer 2 Tunneling Protocol is an IETF standard based on elements of PPTP and Cisco’s similar Layer 2 Forwarding Protocol (L2F); it has several security enhancements over either. Most commonly, L2TP uses RADIUS or TACACS+ authentication and IPsec encryption. That particular combination is called L2TP/IPsec and is natively supported by most modern operating systems. When implemented correctly, it can be very secure, but it uses a double encapsulation method that can hurt performance. An L2TP/IPSec VPN requires UDP ports 500 and 1701; if NAT traversal is required, it also needs UDP port 4500 to be open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IKEv2/IPsec

A

IPsec in tunnel mode can perform as a complete VPN solution along with its associated IKEv2 protocol. It provides similar functionality to L2TP/IPsec while offering higher performance and better firewall traversal. Drawbacks are more complicated server-end implementation and lack of non-IP protocol support. IKEv2 VPN support is built into some newer operating systems and is also available from third-party clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HTML5 (Clientless VPN)

A

SSL/TLS can provide tunneling, strong encryption, and certificate-based authentication. Some NGFW appliances allow it to be used for VPN connections without any local software on the client computer. Instead, it is an HTML5 web application that executes entirely within the browser. Remote users can log into the enterprise NGFW via a web portal, then access the intranet via browser-based TLS tunnel. Clientless VPNs often have limited features and reduced performance next to a client-based VPN, but they can work in situations where users can’t install or configure a normal VPN in their local network environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSL/TLS (Client-based)

A

VPN clients can use SSL/TLS to tunnel the entire IP stack; the result is a robust and secure alternative to L2TP/IPsec, often even with higher performance. SSL/TLS VPNs are available from many vendors, but their capabilities vary. Common examples include the open-source OpenVPN and Microsoft’s Secure Socket Tunneling Protocol (SSTP). One benefit is that they often only need TCP port 443 to be opened, just like an HTTPS server. They also can limit access to the network, restricting the damage done by a compromised client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure Shell

A

SSL has encryption, authentication, and tunneling features so it can be used as a limited VPN, typically for port forwarding or tunneling a single application at a time. It’s useful in specific situations and can provide reasonably strong security. SSH itself operates on TCP port 22, but when used as a VPN, it often opens other ports for particular applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IKE

A

Internet Key Exchange negotiates and authenticates SAs between two hosts and exchanges encryption keys to set up a secure channel. It also manages existing SAs, and periodically replaces keys during a session. It’s actually a specific implementation of the Internet Security Association and Key Management Protocol (ISAKMP) framework for key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AH

A

Authentication Header provides data integrity and source authentication through cryptographic hashes of the packet contents and source identity. Also provides protection features for the IP header itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ESP

A

Encapsulating Security Payload encrypts the packet payload, along with integrity and authentication information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly