Overlay Technologies Flashcards
What is an overlay network
is a logical/virtual network built on top of a physical (underlay) network.
What are the most popular overlay technologies
GRE
IPsec
LISP
VXLAN
MPLS
What is one of the most common problems with overlay tunnels
Recursive routing - the tunnel destination was learnt through the tunnel itself via IGP. this is solved by removing the internet facing interface from the IGP routing protocol.
What is a VPN
When 2 private networks are connected across an unsecure network. to send secure traffic across an unsecure network IPsec is used as an encryption framework suite of protocols.
What is GRE and what are its uses
Generic routing encapsulation is a protocol used to encapsulate traffic across an IP network.
Uses:
Initially used to route non IP traffic across IP networks.
used to tunnel traffic through a firewall
Connect discontiguous networks together
duct tape bad routing designs
VPNs
What protocol number does GRE use
47
Why define bandwidth on a GRE tunnel
For routing protocol metric calculations and QoS.
By default the line protocol on a GRE tunnel is down if there is no route to the destination in the RIB.
True or False
True
What is IPsec
It is a series of standards for creating secure VPNs
What are the main security services provided by IPsec
Peer authentication - using PSK/ certificates
Data confidentiality - Encryption (AES,DES)
Data integrity - Hashing (MD5,SHA-1)
Relay detection - packet sequencing
What are the 2 types of IPsec headers
Authentication header
Encapsulating Service Payload (ESP)
What is the major drawback of authentication header
encryption is not supported
What protocol number does authentication header use
number 51
What are the 2 modes for ESP and what is the difference
Tunnel mode - encrypts the entire packet by placing IPsec header on to the packet. the IPsec header is used to route.
Transport mode - encrypts only packet payload it will use the original IP header to route across the network.
What protocol number does ESP use
50
What is Diffie-Hellman (DH)
DH is an asymmetric key exchange protocol that allows 2 peers to exchange secret keys. It is done by exchanging public keys and using there own private key 2 keys are made independently that are the same and encrypt the data the same so it can be de-crypted the same.
What DH groups should not be used and which should be used
bad - 1,2 & 5
good - 14 and above
What is an RSA signature
is a public key that is used to mutually authenticate peers. (digital certificate)
What is a transform set
it is a configured attribute that defines the security parameters for the IPsec SA negotiation including: security protocol, encryption & authentication algorithms.
What is IKE
Is a protocol used to establish a secure authenticated session between 2 endpoints and use the session to negotiate session keys and parameters for an IPsec tunnel