Securing Network Security Flashcards
What is a VPN?
Virtual Private Network
Extends a private network over a public one, enabling users to securely send and receive data
What is a Site-to-Site VPN?
Establishes secure tunnels over the public internet for interconnecting remote sites
What is a Client-to-Site VPN?
Connects individuals devices directly to the organizations headquarters, enabling remote users to access the network
What is a Full Tunnel VPN?
Maximizes security by encrypting all traffic to the headquarters while integrating clients with the network
Offers more security
What is a Split Tunnel VPN?
Divides traffic and network requests and then routes them to the appropriate network
Offers better performance
What is a Clientless VPN?
used to secure remote access VPN tunnels using a web browser, and it doesn’t require any software or hardware clients to be configured.
What is TLS?
Transport Layer Security
A protocol that provides cryptographic security for secure connections and is used for secure web browsing and data transfer
What is TCP?
Transmission Control Protocol
Used by TLS to establish secure connections between a client and server, but it may slow down the connection
What is DTLS?
Datagram Transport Layer Security
A UDP-based version of TLS protocol that offers the same security level as TLS while maintaining faster operations
What is IPSec?
Internet Protocol Security
Protocol suite for secure communication through authentication and data encryption in IP networks
What are the 5 main steps to establishing a secure VPN tunnel?
- Request to start Internet Key Exchange (IKE)
- IKE Phase 1 - authenticate the parties
- IKE Phase 2 - negotiate the security association parameters and fully establish the secure tunnel.
- Data transfer - allow data transfer between the two parties to occur over the secure tunnel using the IPSec parameters and keys that we stored from the security associations that were negotiated back in step three.
- Tunnel Termination - happens when the security associations are going to be terminated through either a mutual agreement and deletion or due to the timing out of the tunnel because one party became non-responsive.
What is Transport Mode?
Employs the original IP header, ideal for client-to-site VPN’s and is advantageous when dealing with MTU constraints
What is MTU?
Maximum Transmission Unit
going to be set at 1,500 bytes in most of our networks and may cause fragmentation and VPN problems
What is Tunneling Mode?
Employed for site-to-site VPNs and adds a extra header that can increase packet size and exceed the MTU
What is the AH?
Authentication Header
provide connectionless data integrity and data origin authentication for IP datagrams, and it provides protection against replay attacks