Section 16.152 Securing Network Communications Flashcards

Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security

1
Q

Virtual Private Networks (VPNs)

A

Extend private networks across public networks to allow remote users to securely connect to an organisations network

■ Can be configured as site-to-site, client-to-site, or clientless VPNs

■ In addition to site-to-site and client-to-site VPNs, we have to decide whether we are going to use a full tunnel or split tunnel VPN configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VPNs

Site-to-Site VPN

A

○ Connects two sites cost-effectively

○ Replaces expensive leased lines

○ Utilises a VPN tunnel over the public internet

○ Encrypts and secures data between sites

○ Slower, but more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VPNs

Client-to-Site VPN

A

○ Connects a single host (e.g., laptop) to the central office

○ Ideal for remote user access to the central network

○ Options for full tunnel and split tunnel configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VPNs

Clientless VPN

A

○ Uses a web browser to establish secure, remote-access VPN

○ No need for dedicated software or hardware client

○ Utilises HTTPS and TLS protocols for secure connections to websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VPNs

Full Tunnel VPN

Can be used with either site to site or client to site VPN

A

○ Encrypts and routes all network requests through the VPN

○ Provides high security, clients fully part of central network

○ Limits access to local resources

○ Suitable for remote access to central resources

Default for organisations offers more security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VPNs

Split Tunnel VPN

Can be used with either site to site or client to site VPN

A

○ Divides traffic, routing some through the VPN, some directly to
the internet

○ Enhances performance by bypassing VPN for non-central traffic

○ Less secure; potential exposure to attackers

○ Recommended for better performance but requires caution on untrusted networks

offers better peformance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Transport Layer Security (TLS)

A

A protocol that provides cryptographic security for secure connections and is used for secure web browsing and data transfer

■ Used for secure connections in web browsers (HTTPS)

■ Uses Transmission Control Protocol (TCP) for secure connections between a client
and a server

may slow down the connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Datagram Transport Layer Security (DTLS)

A

A UDP-based version of TLS protocol that offers the same security level as TLS while maintaining faster operations

● Ensures end-user security and protects against eavesdropping in clientless VPN connections

● Ensures confidentiality, integrity, and authentication of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internet Protocol Security (IPSec)

A

A secure protocol suite for IP communication through authentication and data encryption in IP networks

■ Provides confidentiality, integrity, authentication, and anti-replay protection

■ Used for both site-to-site and client-to-site VPNs

■ Five key steps in establishing an IPSec VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Five key steps in establishing an IPSec VPN

1 Request to start the Internet Key Exchange (IKE)

A

PC1 initiates traffic to PC2, triggering IPSec tunnel creation by
RTR1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Five key steps in establishing an IPSec VPN

2 Authentication - IKE Phase 1

A

RTR1 and RTR2 negotiate security associations for the IPSec IKE Phase 1 (ISAKMP) tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Five key steps in establishing an IPSec VPN

3 Negotiation - IKE Phase 2

A

IKE Phase 2 establishes a tunnel within the tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Five key steps in establishing an IPSec VPN

4 Data transfer

A

Data transfer between PC1 and PC2 takes place securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Five key steps in establishing an IPSec VPN

5 Tunnel termination

A

Tunnel torn down including the deletion of IPSec security
associations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPSec Tunneling Modes (Data transfer step 4)

Transport Mode

A

Uses original IP header

○ Suitable for client-to-site VPNs
○ Avoids potential fragmentation issues from MTU constraints

MTU (Maximum Transmission Unit): et by default at 1500 bytes and may cause fragmentation and other VPN problems

Does not increase packet size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IPSec Tunneling Modes (Data transfer step 4)

Tunneling Mode

A

○ Adds a new header to encapsulate the entire packet (think a letter within a letter)

○ Ideal for site-to-site VPNs

○ May increase packet size and require jumbo frames

○ Provides confidentiality for both payload and header

17
Q

Authentication Header (AH)

A

Offers connectionless data integrity and data origin authentication for IP
datagrams using cryptographic hashes as identification information

18
Q

Encapsulating Security Payload (ESP)

A

● Provides confidentiality, integrity, and encryption

● Provides replay protection

● Encrypts the packet’s payload

19
Q

Considerations

A

■ Balance between security and performance when choosing VPN tunnel type
■ Use full tunnel VPNs for higher security but reduced local access
■ Use split tunnel VPNs for better performance but potentially lower security
■ Ensure proper MTU settings when using tunneling mode in site-to-site VPNs
■ AH for integrity and ESP for encryption in IPSec, but both can be used together
for comprehensive security