3.3 VPN's Flashcards

1
Q

What device manages encryption for VPN’s?

A

VPN concentrator. It’s a stand alone device or built into the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different deployment options for VPN’s?

A

Specialized VPN hardware or software-based VPN’s.

The software VPN’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can VPN’s use SSL?

A

Yes, its common to use a “coffee shop” VPN that operates over port 443. These usually prevent firewall issues. You will probably authenticate with a user name/password and/or two-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do VPN’s and HTML5 work together?

A

HTML5 supports API’s to include a Web Cryptography API as a part of the browser. This means you don’t need to install VPN software, SSL VPN’s are basically built into HTML5. You just need to have a browser that supports HTML5.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a Full Tunnel VPN connection work?

How does this differ from Split Tunnel VPN’s?

A

The remote user will send ALL traffic to the networked VPN concentrator first. If the user wants to visit something else on the internet, it will still be routed through the VPN concentrator.

In a split tunnel, the user can visit somewhere else on the internet without having to go through the networked VPN concentrator first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do “site-to-site” VPN’s work?

A

Generally a remote work location and the corporate network will both have firewalls which will also act as VPN concentrators. The VPN concentrators will connect to one another. Additionally, it is very common for that VPN connection to be active all of the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an L2TP VPN?

A

L2TP is the Layer 2 Tunneling Protocol. The VPN connects the sites over a layer 3 network, but they act as if they are connected at layer 2.

These are commonly encrypted by IPsec. It’s called L2TP over IPsec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What part of IPsec provides anti-replay?

A

Both the AH and the ESP. Packet Signing and sequence numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between IPsec Transport and Tunnel Modes?

A

Transport: Data is encrypted. IP Header is not.

Tunnel: IP header and data is encrypted. A new IP header is placed on the packet and is sent to the IPsec concentrator on the other side of the tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If you only care about the Integrity of the data, would you use the AH or the ESP? How does this work?

A

Use the AH only. This is a hash of the packet and a shared key between the two IPsec concentrators.

Hash provides integrity. Shared key provides authentication. Sequence numbers provide anti-replay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What encryption and hash does the ESP use?

A

Commonly uses SHA-2 for hash and AES for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the order of the packet in Transport Mode?

A

IP Header > AH Header > ESP Header > Data > ESP Trailer > Integrity Check Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the order of the packet in Tunnel Mode?

A

New IP Header > AH Header > ESP Header > IP Header > Data > ESP Trailer > Integrity Check Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly