5.5 IPsec and site-to-site VPNs Flashcards

Summarize IPsec remote access and site-to-site VPNs. (45 cards)

1
Q

What does IPsec stand for?

A

Internet Protocol Security

IPsec is a suite of protocols designed to secure IP communications through authentication and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of IPsec?

A

To secure communication over IP networks.

It provides confidentiality, integrity, and authentication, ensuring secure data exchange over untrusted networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two main types of IPsec VPNs?

A
  1. Remote Access VPN
  2. Site-to-Site VPN

Remote Access VPN – Allows users securely connect to their work network from anywhere.

Site-to-Site VPN – Links entire office networks so they can communicate securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the first action taken in the IPsec encryption sequence?

A

Initiate security association and key exchange negotiations.

IPsec begins with the negotiation of security associations (SAs) and key exchange between peers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List the three core security services of IPsec.

A
  1. Confidentiality
  2. Integrity
  3. Authentication

Confidentiality – Protects data by encrypting it.

Integrity – Ensures data is not altered using hashing.

Authentication – Verifies the sender’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two main IPsec protocols?

A
  1. AH (Authentication Header)
  2. ESP (Encapsulating Security Payload)

AH – Provides authentication and integrity but no encryption.

ESP – Ensures authentication, integrity, and encrypts data for confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is ESP preferred over AH?

A

ESP provides encryption.

AH only authenticates data, making ESP the better choice for securing transmitted information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two IPsec modes?

A
  1. Transport
  2. Tunnel

Transport Mode – Encrypts only the payload of the IP packet.

Tunnel Mode – Encrypts the entire IP packet for full protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False:

In transport mode, the IP header is encrypted.

A

False

Transport mode encrypts only the payload, leaving the original IP header visible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank:

In IPsec ______ mode, both the IP header and payload are encrypted.

A

tunnel

Tunnel mode secures the entire packet and is widely used in site-to-site VPNs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define:

tunneling

A

The process of encapsulating packets within other packets.

Tunneling allows data to be securely transmitted over a public network (such as the Internet) by encapsulating the original data packets within encrypted IPsec packets, making them unreadable to unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What protocol negotiates IPsec security associations?

A

IKE

Internet Key Exchange (IKE) manages secure key exchanges for IPsec connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens in IKE Phase 1?

A

Secure communication is established.

Phase 1 sets up authentication and encryption for negotiating the main IPsec connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens in IKE Phase 2?

A

The IPsec tunnel is built.

Phase 2 defines the encryption and authentication settings used to secure data transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two IKE Phase 1 modes?

A
  1. Main
  2. Aggressive

Main Mode – Provides stronger security by establishing a secure connection in multiple steps.

Aggressive Mode – Completes the connection faster but exposes some security details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is IKEv2 preferred over IKEv1 in IPsec VPNs?

A

It offers improved security and faster connection establishment.

IKEv2 provides better encryption support, faster key exchange, and stronger protection against attacks compared to IKEv1, making it more efficient for modern VPNs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the role of a VPN concentrator?

A

It manages multiple VPN connections.

A VPN concentrator aggregates VPN connections, performing encryption and authentication for secure communication and commonly used in large-scale deployments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define:

remote access VPN

A

A VPN for individual users.

It allows employees or telecommuters to securely access a corporate network remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are two features of remote access VPNs that employ TLS?

A
  1. They facilitate secure connections for telecommuters to corporate networks.
  2. They utilize the TLS protocol for secure sessions.

Remote access VPNs allow users to connect securely to a corporate network, using the TLS protocol to create encrypted sessions.

20
Q

Why do remote access VPNs use SSL instead of IPsec?

A

SSL VPNs offer easier access via standard web browsers.

SSL VPNs are designed to be accessible through standard web browsers, eliminating the need for specialized client software.

21
Q

What are two protocols used for secure remote access VPNs?

A
  1. IPsec (Internet Protocol Security)
  2. TLS (Transport Layer Security)

IPsec – Secures all traffic between endpoints at the network layer, ideal for site-to-site connections.

SSL/TLS – Secures web traffic at the transport layer, works within web browsers for easy access.

22
Q

What is the main difference between IPsec and SSL VPNs?

A
  • IPsec operates at Layer 3
  • SSL operates at Layer 4

IPsec VPNs secure traffic between two devices (e.g., routers), while SSL VPNs typically provide secure access to web applications through a browser, making them more user-friendly and easier to deploy.

23
Q

True or False:

Remote access VPNs require a VPN gateway.

A

True

The VPN gateway authenticates users and encrypts transmitted data.

24
Q

What device serves as a VPN gateway?

A

A router or firewall.

Routers or firewalls are commonly used to encrypt/decrypt traffic and enforce security policies between private networks or remote users.

25
# Define: site-to-site VPN
A VPN **connecting** two or more networks. ## Footnote It *securely links* offices or data centers over the internet using IPsec.
26
List *two* **characteristics** of site-to-site VPNs.
1. They are set up on routers and firewalls. 2. They can utilize IPsec for securing connections. ## Footnote *Site-to-site VPNs* **connect** different locations of a network and are established on network devices.
27
# True or False: Site-to-site VPNs **require an application** for individual users to connect.
False ## Footnote *Site-to-site VPNs* are typically set up between *two network devices* (such as routers or firewalls), so individual users do not need to install client applications.
28
What **IPsec mode** is used in site-to-site VPNs?
Tunnel ## Footnote *Tunnel mode* **encrypts** the full packet, protecting data between connected networks.
29
What **VPN feature** guarantees that intercepted data cannot be read by **unauthorized parties**?
Confidentiality ## Footnote **Confidentiality** is achieved through encryption, ensuring that only the intended recipient can access the data.
30
What **VPN feature** prevents **unauthorized alteration** of data during transmission?
Data integrity ## Footnote *Data integrity* ensures that the information sent over a VPN remains **unchanged** and is not tampered with during transit.
31
What ensures data is **not altered** in transit?
Integrity ## Footnote *Hashing algorithms* like **SHA** verify that transmitted data remains unchanged.
32
What **VPN technology** is used to establish a tunnel for unencrypted packets?
Generic Routing Encapsulation | (GRE) ## Footnote **GRE** *creates a virtual tunnel* between routers, allowing for the transmission of unencrypted packets. It can also be **combined** with IPsec for encryption.
33
# True or False: IPsec **uses** SHA and MD5 for integrity.
True ## Footnote These *hashing algorithms* ensure data is not modified during transmission.
34
How does NAT (Network Address Translation) **affect** IPsec?
It **modifies packet headers**, which can interfere with IPsec protocols. ## Footnote This interference can *disrupt the integrity checks* performed by IPsec, particularly affecting the Authentication Header (AH).
35
Why is authentication **important** in IPsec VPNs?
It **verifies** sender identity. ## Footnote **Authentication** prevents *unauthorized access* using PSKs or digital certificates.
36
# Fill in the blank: IPsec authentication methods **include** \_\_\_\_\_\_ \_\_\_\_\_\_ and digital certificates.
pre-shared keys ## Footnote **PSKs** are *simpler but less secure* than certificate-based authentication.
37
What are the *three* **encryption algorithms** used in IPsec?
1. AES (Advanced Encryption Standard) 1. DES (Data Encryption Standard) 1. 3DES (Triple Data Encryption Standard) ## Footnote **AES** – The most secure encryption algorithm used in IPsec. **DES** – An older encryption method that is now considered weak. **3DES** – An improved version of DES but less efficient than AES.
38
Why do businesses **prefer** VPNs over leased lines?
VPNs are **cheaper**. ## Footnote *Leased lines* provide dedicated, private connectivity but are **expensive**. VPNs use existing internet connections to create secure and encrypted tunnels.
39
List *three* **use cases** for site-to-site VPNs.
1. Office connections 1. Partner networks 1. Corporate mergers ## Footnote **Office connections**: Securely connects branch offices to headquarters. **Partner networks**: Allows secure data exchange between business partners. **Corporate mergers**: Integrates different company networks securely over a shared VPN.
40
# True or False: IPsec VPNs work **only** in private networks.
False ## Footnote *Psec VPNs* **operate** over public networks (e.g., the Internet) while maintaining privacy through encryption.
41
What **commonly causes** an IPsec VPN failure?
**Mismatched security settings** between endpoints. ## Footnote **Psec** requires both endpoints to have identical settings, including encryption algorithms, authentication methods, and key exchange parameters.
42
What is **VPN split tunneling**?
Only **some traffic** goes through the VPN. ## Footnote Split tunneling allows certain traffic (e.g., corporate resources) to go *through the VPN* while other traffic (e.g., general web browsing) goes directly to the internet.
43
What is the **function** of Dead Peer Detection (DPD) in IPsec?
It **monitors the availability** of the VPN peer. ## Footnote **DPD** is used to detect when a VPN peer becomes unreachable and initiates reconnection, ensuring continuous secure communication.
44
What is the **function** of the ESP header in an IPsec packet?
It **provides** encryption and optional authentication. ## Footnote The *ESP header* is responsible for securing the data by **encrypting** it, and optionally providing integrity and authentication, ensuring the data cannot be tampered with during transit.
45
# Fill in the blank: Checking if a VPN tunnel is **active** is called \_\_\_\_\_\_ \_\_\_\_\_\_.
keepalive monitoring ## Footnote *Keepalive monitoring* **sends** periodic test packets to **verify** the status of the VPN tunnel. If no response is received, it triggers the process to *check and re-establish the tunnel* if necessary.