Virtual Private Networks Flashcards

1
Q

What is a VPN?

A

A VPN connects the resources and components of one network to another over a public infrastructure, such that it appears as if data is being sent over a dedicated link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the types of VPN?

A

Access - connection to remote users
Extranet - connection to suppliers/partners/clients
WAN - Connection to branch offices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why use VPN’s?

A
  • Cost effectiveness
  • Flexibility
  • Scalability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does a VPN work?

A

A VPN establishes tunnels through the Internet to send packets. A tunnel is a logical stream of packets in which each packet is encapsulated with an additional header as it travels through the public network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a tunnel provide security?

A
  • With an extra header, the rest of the payload can be encrypted; the packet can also be authenticated and certified
  • Firewall provides access control
  • Result: all 7 security goals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the IPSEC Tunneling protocol?

A
  • IPSEC is supposedly the best security solution for building VPN’s
  • It is a network layer tunneling protocol for IP
  • Provides per packet, end to end, protection
  • Accommodates a wide variety of cryptographic algorithms for confidentiality, integrity, and authentication
  • High flexibility allows nesting or bundling of its component protocols
  • Efficient key management and exchange procedure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the components of IPSEC?

A

1 - Authentication header
2 - Encapsulating security payload
3 - internet key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an authentication header (AH)?

A
  • Provides integrity and authentication
  • contains a message digest for the contents of the packet
  • no encryption provided by AH

Has a next header code, header length, sequence number, message digest, SPI (security parameters index), authentication data/message digest/secure hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the AH modes

A

Transport mode:
Original IP Header ->AH->Payload

Tunnel mode:
New IP Header ->AH->Original IP Header->Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an encapsulating security payload (ESP)

A
  • provides confidentiality, integrity, and authentication
  • encryption algorithms DES, 3DES, etc

Has next header code, header length, security parameters index, sequence number, message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the ESP modes

A

Transport mode:
Original IP header -> ESP header -> Payload -> ESP Tailer

Tunnel mode:
New IP header -> ESP header -> original IP header -> Payload -> ESP tailer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Internet Key Exchange?

A
  • secure exchange of keys is critical to the security of a tunneling protocol
  • Two main phases
    • Establishment of a security association
    • Secure exchange of messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a security association (SA)?

A
  • A security association between the two tunnel peers defines the encryption and authentication algorithms, the key lengths, and their lifetimes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe IKE Phase I

A
  • Security Association messages are sent and negotiated in messages 1 and 2
  • Diffie hellman exchanges are done in messages 3 and 4 and a SKEYID (master key) is established
  • Digital signatures and certificates are exchanges in messages 5 and 6, they are encrypted using SKEYID. The two nodes authenticate each other
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe IKE Phase 2

A
  • Using encrypted packets and protected by digital signatures they do another DH exchange
  • This generates the secret session key
  • Data is transferred using the secret session key
  • Keys are refreshed every few minutes in Phase II
  • Uses a private key encryption algorithm using the secret key from this phase
How well did you know this?
1
Not at all
2
3
4
5
Perfectly