Overlay Tunnels Flashcards

1
Q

What is GRE?

A

Generic Routing Encapsulation (GRE) is a tunneling protocol that provides connectivity to a wide variety of network-layer protocols by encapsulating and forwarding packets over an IP-based network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When configuring a GRE tunnel interface, what is required?

A

When configuring a tunnel interface, the tunnel source, tunnel destination, and IP address are required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does recursive routing occur when in Tunnels?

A

Recursive routing occurs when a router tries to reach the remote router’s encapsulating interface (transport IP) via the tunnel (overlay network). This is a common issue when the transport network is advertised into the same routing protocol that runs on the relay network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ESP and what does it provide?

A

Encapsulating Security Payload (ESP) provides data confidentiality, authentication, and protection from hackers replaying packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Tunnel mode do?

A

Tunnel mode encrypts the entire original packet and adds a new set of IPsec headers. These new headers are used to route the packet and also provide overlay functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Transport mode do?

A

Transport mode encrypts and authenticates only the packet payload. This mode does not provide overlay functions and routes based on the original IP headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is IKE?

A

Internet Key Exchange (IKE) is a protocol that performs authentication between two endpoints to establish security associations (SAs), also known as IKE tunnels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two different ways to encrypt traffic over a GRE tunnel?

A

Two ways to encrypt traffic over a GRE tunnel:

Using crypto maps and using tunnel IPsec profiles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is LISP and why was it created?

A

Location/ID Separation Protocol (LISP) is a routing architecture and a data and control plane protocol that was created to address routing scalability problems on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does the LISP Routing Architecture function?

A

LISP separates IP addresses into endpoint identifiers (EIDs) and routing locators (RLOCs). This way, endpoints can roam from site to site, and the only thing that changes is their RLOC; the EID remains the same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does the LISP Control Plane operate?

A

LISP resolves an EID into an RLOC by sending map requests tot he MR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is VXLAN?

A

VXLAN is an overlay data plane encapsulation scheme that was developed to address the various issues seen in traditional Later 2 networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a VNI?

A

VXLAN network identifier (VNI) is used to provide segmentation for Layer 2 and Layer 3 traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are VTEPs and how are they used?

A

Virtual Tunnels Endpoints (VTEPs) are entities that originate or terminate VXLAN tunnels. They have local LAN interfaces and a core-face network interface known as the IP interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly