Virtual Private Networks Flashcards
VPN
Virtual Private Network
Secure connection between remote end and private network.
VPN Concentrator
Advanced router that handles multiple connections (tunnels) into a network.
IP Tunnel
Secure VPN connection between two endpoints
Remote Access VPN
Facilitates network access for users in remote office networks.
Client initiates the connection.
Site-to-Site VPN
Virtual link from one site to another. Replaces a WAN type of connection.
Requires network hardware (router / firewall) to create and maintain connection.
Hub-and-Spoke Network
Traditional site-to-site VPN
DMVPN
Dynamic Multipoint Virtual Private Network
Spoke-to-spoke network
Data exchanged between sites without passing through organization’s VPN
Client-to-Site VPN
Mobile users remotely access information from home network
GRE
Generic Routing Encapsulation
Early tunneling protocol (1994)
Used in site-to-site VPNs. Encapsulates 20 types of protocols.
PPP
Point-to-Point Protocol
Dial-up connection with ISP
PAP
Password Authentication Protocol
Multifactor authentication protocol
Unencrypted (clear-text) authentication method
CHAP
Challenge Handshake Authentication Protocol
Encrypted authentication, uses MD5 file hashing
SHA
Secure Hash Algorithm
Secure Hash Algorithm
Required for certain government applications
SHA-0, -1, -2, -3
EAP
Extensible Authentication Protocol
A PPP authentication method
PPTP
Point-to-Point Tunneling Protocol
L2TP
Layer 2 Tunneling Protocol
Merges PPTP and L2F
IPSEC
Internet Protocol Security
Encrypted end-to-end connection
Uses AH and ESP
AH
Authentication Header
Guarantees authenticity of IP packets. uses one-way hash algorithm.
ESP
Encapsulating Security Payload
Provides confidentiality to data with encryption such as DES, 3DES, AES
AES
Advanced Encryption Standard
IKE
Internet Key Exchange
Manages negotiation between devices establishing IPsec tunnels
ISAKMP
Internet Security Association and Key Management Protocol