IPsec VPN Flashcards

1
Q

What port does IKE use?

A
  • UDP 500
  • UDP 4500 with NAT-T
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What VPN topology has the simplest configuration?

A

Hub-and-Spoke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some cases in which you wouldn’t want a Hub-and-Spoke VPN topology?

A
  • If you want fault tolerance
  • If you need direct communication between sites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the likely cause if an IPsec tunnel is not coming up and you get a negotiation failure error?

A

IPsec configuration mismatch, verify phase 1 and 2 configurations between both peers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the likely cause if an IPsec tunnel is unstable and you get an error saying DPD packet lost?

A
  • ISP issue, check internet connection
  • Enable NAT-Traversal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What must be done in the firewall policy for an IPsec tunnel to come up?

A

Create a policy accepting traffic on the IPsec tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What setting determines whether a tunnel is used as primary or backup?

A

Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two modes IPsec can operate in?

A
  • Transport
  • Tunnel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What authentication does IKEv1 support?

A
  • XAuth
  • PSK and certificate signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What authentication does IKEv2 support instead of XAuth?

A

EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a reason to use mesh topology over hub-and-spoke?

A
  • Hub-and-spoke branch offices must go through HQ is slower than a direct connection, especially if physically distant
  • Mesh devices are directly connected and you can bypass HQ
  • More fault tolerant
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some remote gateway types in VPNs?

A
  • Dialup User
  • Static IP Address
  • Dynamic DNS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When would you use Dialup User?

A

When the remote peer IP address is unknown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is IKE Mode Config?

A
  • An alternative to DHCP over IPsec
  • A server assigns network settings to clients over IKE messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What problem did NAT traversal solve?

A
  • The ESP protocol has problems crossing devices that are performing NAT
  • Solves the incompatibility between NAT and IPSec
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are keepalive probes used for?

A
  • Probes are sent frequently to keep the connection across the routers active
  • Used in NAT-T
17
Q

What is the default mode of dead peer detection?

A
  • On demand
  • FortiGate sends DPD probes if there is only outbound traffic through the tunnel, but no inbound
  • (Only outbound traffic could be indication of a network failure)
18
Q

What are the two authentication methods FortiGate supports in phase 1?

A
  • Pre-shared Key
  • Signature
19
Q

What are the two negotiation modes IKE supports?

A
  • Main mode (more secure)
  • Aggressive mode (faster)
20
Q

What are benefits of using route-based IPsec VPN over Policy-based?

A
  • Can deploy variations of VPNs like L2TP and GREE
  • Can enable dynamic routing protocols for scalability
  • Leverage multiple connections to the same destination for redundancies
  • Can configure routing and firewall policies for IPsec traffic
21
Q

What do you need to make your IPsec VPN deployment more resilient?

A

Provide a second ISP connection to your site and configure two IPsec VPNs

22
Q

What are some steps needed to configure a redundant VPN?

A
  • Create one phase 1 and one phase 2 for each path; primary and backup
  • Enable DPD on both ends
  • Add at least one static route for each VPN, with the primary having a lower distance
  • Configure firewall policies to allow traffic through both VPNs