Remote Access Methods Flashcards
Encapsulating a payload protocol within a delivery protocol to ensure secure transmission is known as what?
Tunnelling
List the 4 types of VPNs
1) Client-to-site (Remote-Access)
2) Host-to-Host VPN
3) Site-to-Site VPN
4) Extranet VPN (allows organizations suppliers/partners to connect to the network)
What’s the main benefit of using a site-to-site VPN for connecting remote offices than other WAN technologies?
It’s cheap!
List the 5 tunnelling protocols covered in CompTIA
1) DTLS
2) L2TP
3) GRE
4) IPsec
5) PPTP
When might you use DatagramTLS?
DTLS is a protocol based on TLS that is capable of securing the datagram (connectionless) transport so you might use it for securing delay-sensitive traffic.
Which tunnelling protocol would you choose if you had to connect networks that used non-TCP/IP traffic?
L2TP (PPTP using GRE can do this but considered obsolete)
Who created L2TP?
IETF
Which data-link layer tunnelling protocol allows access to a VPN using ports TCP 1723 and IP 47?
PPTP
Which technique encapsulates Point-to-Point Protocol (PPP) frames in Internet Protocol (IP) packets using the Generic Routing Encapsulation (GRE) protocol.
PPTP
List 4 characteristics of GRE
1) Uses protocol-type field to transport any Layer 3 protocol
2) It is STATELESS and has NO FLOW CONTROL
3) It has NO ENCRYPTION
4) Create addition OVERHEAD
Which tunneling protocol was designed by the IETF, works at the Network layer of the OSI model and supports both IPv4 and IPv6?
IPSec
Which two major protocols work inside IPSec?
1) AH - Authentication Header (responsible for providing integrity and authentication using Integrity Value Check i.e. IVC)
2) ESP - Encapsulating Security Payload (responsible for encryption)
What do you need to be aware of when tunnelling to NAT networks using IPSec?
The Authentication Header protocol isn’t compatible
What is the difference between IPSec transport and tunnelling modes?
1) Transport mode creates a secure tunnel between two devices (e.g. host to host/host to server)
2) Tunnelling mode creates a secure tunnel between two end points like routers.
What is the key advantage of ISAKMP? Which tunnelling protocol is it integrated into?
It allows for separating out of the method for safely transferring key and authentication independent of the key generation technique.
IPSec