VPNs Flashcards

1
Q

What is Virtual Private Networks

A

A private network that is created via tunneling over a public network, usually the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Benefits of Virtual Private Networks

A
  • Compatibility with different broadband technology
  • Cost savings
  • Security
  • Scalability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VPN services

A
  • Authentication
  • Data integrity
  • Confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Architecture Classifications

A

i. Intranet VPN
* LAN-to-LAN connection (site to site)
* Connects Branch Offices to Main Office
* Fixed Tunnel End Points

ii. Extranet VPN
* LAN-to-LAN connection (site to site)
* Connects Trading Partners to Main Office
* Fixed Tunnel End Points

iii. Remote VPN
* User-to-LAN connection
* Connects Remote Mobile Users to Main Office
* Variable IP Addresses on Tunnel End Points
* A.k.a. Virtual Private Dial-up Network (VPDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tunnelling Taxonomy
Classification - Voluntary Tunnels

A

i. End-to-end tunnels
ii. Created at the request of a client computer, which acts as the tunnel end point
iii. A separate tunnel is created for each communicating pair
iv. Eg. Dial-up connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tunnelling Taxonomy
Classification - Compulsory Tunnels

A

i. Intermediate devices act as tunnel end points
ii. Created and configured by an intermediate device
iii. Compulsory tunnels are shared by multiple
communications
iv. Intermediate device named differently in different tunnelling protocols e.g. Intermediate device is
called IP Security Gateway in IPSec,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tunnelling Protocols on Difference OSI layers (mcq)

A
  1. Layer 2 tunnelling protocols
    * Data Link Layer
    * Use frames as their unit of exchange
    * PPP
  2. Layer 3 tunnelling protocols
    * Network Layer
    * IPSec
  3. Application Layer Protocol
    * Application Layer
    * SSL VPN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 2 Site to Site VPNs

A
  • Cisco Generic Routing Encapsulation (GRE)
  • IP Security Protocol (IPsec)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Generic Routing Encapsulation (GRE)

A
  • GRE can encapsulate almost any type of packet.
  • Uses IP to create a virtual point-to-point link between Cisco routers
  • Supports multiprotocol (IP, CLNS, …) and IP multicast tunneling (and therefore routing protocols)
  • Best suited for site-to-site multiprotocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Generic Routing Encapsulation (GRE) statement

A

(ref image)
R1(config)# interface tunnel 0
R1(config–if)# ip address 10.1.1.1
255.255.255.252
R1(config–if)# tunnel source serial 0/0
R1(config–if)# tunnel destination
209.165.200.225
R1(config–if)# tunnel mode gre ip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IPsec - Internet Protocol
Security

A
  • A “framework” of open standards developed by the IETF to create a secure tunnel at the network (IP) layer.
  • It spells out the rules for secure
    communications.
  • IPsec is not bound to any specific encryption or authentication algorithms, keying technology, or security algorithms.
  • IPsec allows newer and better algorithms to be implemented without patching the existing IPsec
    standards.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 2 IPsec Framework Protocols

A
  • AH: Authentication Header
  • ESP: Encapsulating Security Payload
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication Header (AH)

A
  • provides authentication and optional replay-detection services using PSK or RSA.
  • It supports DH Secure key exchange
  • supports integrity via hash verification using HMAC-MD5 and HMAC-SHA-1 algorithms.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Authentication Header (AH) NOT provide

A

Confidentiality (encryption).
* It is appropriate to use when confidentiality is not required or permitted.
* All text is transported unencrypted.
* It only ensures the origin of the data and verifies that the data has not been modified during transit.(integrity assured)
* If the AH protocol is used alone, it provides weak protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encapsulating Security Payload (ESP)

A
  • ESP provides the same security services as AH
    (authentication and integrity) AND encryption service.
  • It encapsulates the data to be protected.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port of Encapsulating Security Payload (ESP)

A

protocol number 50

17
Q

Port of Authentication Header (AH)

A

protocol number 51

18
Q

Transport Mode

A
  • Security is provided only for the Transport Layer and above.
  • It protects the payload but leaves the original IP address in plaintext.
    ESP transport mode is used between hosts.
19
Q

What does Transport Mode work well with

A
  • Transport mode works well with GRE, because GRE hides the addresses of the end devices by adding its own IP.
20
Q

Tunnel Mode

A
  • Tunnel mode provides security for the complete original IP packet.
  • The original IP packet is encrypted and then it is encapsulated in another IP packet (IP-in-IP encryption).
  • ESP tunnel mode is used in remote access and site-to-site implementations.