NetSec_8_VPNs Practical Flashcards

1
Q

ACL Syntax for IPsec Traffic (3)

A

access-list acl# permit udp source_ip wildcard destination_ip wildcard eq isakmp

Permits ISAKMP traffic.

access-list acl# permit esp source_ip wildcard destination_ip wildcard

Permits ESP traffic.

access-list acl# permit ahp source_ip wildcard destination_ip wildcard

Permits AH traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Configuration Tasks for IPsec VPN (5)

A
  1. Configure the ISAKMP policy for IKE Phase 1
  2. Configure the IPsec Policy for IKE Phase 2
  3. Configure a Crypto Map for the IPsec Policy.
  4. Apply the IPsec Policy
  5. Verify the IPsec Tunnel is operational.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Configuring ISAKMP Policy for Phase 1 (2)

A

crypto isakmp policy priority_value // Priority 1 to 10000

Lowest priority value has the highest priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HAGLE (3)

A
  • Mnemonic to remember the five SA’s to configure for Phase 1.
  • Refers to ISAKMP Config Commands
    1. Hash
    2. Authenticate
    3. Group (Diffie-Helman Group)
    4. Lifetime
    5. Encryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hash ISAKMP Config Command with Options (2)

A

hash { sha | md5 } // Sets hash to SHA-1 or MD5

no hash // Resets hash command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authenticate ISAKMP Config Command with Options. (4)

A

authentication { rsa-sig | rsa-encr | pre-share }

rsa-sig // RSA Signatures as authentication method

rsa-encr // RSA Encrypted nonces as authentication method.

pre-share // Pre-Shared Keys as authentication method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Group ISAKMP Config Command (3)

A

group DiffieHelman_GroupNumber

DH Groups: 1, 2, 5, 14, 15, 16, 19, 20, 21, 24

Lowest = Least Secure ; Highest = Most Secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lifetime ISAKMP Config Command (2)

A

lifetime seconds // Sets lifetime of key exchange security association.

60 sec (min.) to 86400 sec. (max ; 1 day)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption ISAKMP Config Command with Options (5)

A

encryption { des | 3des | aes bits | seal }

des // 56 bit keys

3des // 56 bit keys (3 times)

aes // 128, 192, or 256 bit keys

seal // 160 bit keys streaming cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Configuring Pre-Shared Key (Phase 2) (2)

A

crypto isakmp key keystring address peer_ip_address

crypto isakmp key keystring hostname peer_hostname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Command Used to Display the Status of an IKE Phase 1 Tunnel.

A

show crypto isakmp sa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Transform Set Definition

A

Encryption and hashing algorithms to be used to transform the data during the VPN communication, negotiated during Phase 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Configuring IPsec Transform Set (2)

A

crypto ipsec transform-set transform_set_tag upToThreeTransformKeywords

Can only have 1 AH transform per transform set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Syntax to Configure Crypto Map (5)

A

crypto map map_name seq_number {ipsec-isakmp | ipsec-manual }

map name = name of crypto map

seq_number = Sequence number for crypto map.

ipsec-isakmp // Indicates IKE will be used.

ipsec-manual // IKE will not be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Steps to Complete Crypto Map Configuration (5)

A
  1. match address acl_number // Binds ACL for interesting traffic to crypto map.
  2. set transform-set cryptoMapName
  3. set peer peer_IP_address
  4. set pfs DH_Group# // Group number value set as group1, group2, etc
  5. set security-association lifetime seconds time_in_Seconds. // Sets the tunnel lifetime.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Command to Display Current Crypto Maps

A

show crypto map

17
Q

Applying Crypto Map to Interface (2)

A

interface outbound_interface_ID

crypto map crypto_map_name

18
Q

Extended Ping (3)

A

ping ip destination_ip source designated_source_ip

Sends ping to destination IP address as if it was originating from the sourfce IP address.

Used to send interesting traffic to trigger ISAKMP ACL

19
Q

Command To Display Infor About IPSEC Tunnels.

A

show crypto ipsec sa