IPSEC VPN Flashcards
What are the 5 steps of IPSEC VPN
Identify interesting traffic IKE phase I IKE phase II IPSEC Tunnel Tunnel termination
What is IKE phase I
Peered networks agreeing to a set of rules, exchanging keys to validate authorized traffic
What is IKE phase II
Uses IKE phase I tunnel to establishes IPSEC security associations
What is the IPSEC Tunnel?
Activation of the IPSEC tunnel, and allows the traffic to traverse the secure link
What is the identification of interesting traffic?
A router identifying traffic that matches a set of rules in a data packet that indicates it is destined for a peered network.
What is tunnel termination?
After the traffic that initiated the VPN tunnel traverses the network and no other interesting traffic is identified for that tunnel session is identified, the tunnel session ends and all associated keys and authentication are discarded.
What is a customer gateway?
The customer side of a VPN connection with AWS
What is an AWS VPN-Endpoint?
An AWS side of a VPN connection with AWS
How does AWS give customers the option to create resilient VPN connections with AWS?
By providing multiple VPN-Endpoints that each customer gateway can connect to.
To create a resilient VPN connection, what must be done?
at least 2 customer gateways connecting to at least two VPN-Endpoints.