5.5 IPsec and site-to-site VPNs Flashcards
Summarize IPsec remote access and site-to-site VPNs. (45 cards)
What does IPsec stand for?
Internet Protocol Security
IPsec is a suite of protocols designed to secure IP communications through authentication and encryption.
What is the purpose of IPsec?
To secure communication over IP networks.
It provides confidentiality, integrity, and authentication, ensuring secure data exchange over untrusted networks.
What are the two main types of IPsec VPNs?
- Remote Access VPN
- Site-to-Site VPN
Remote Access VPN – Allows users securely connect to their work network from anywhere.
Site-to-Site VPN – Links entire office networks so they can communicate securely.
What is the first action taken in the IPsec encryption sequence?
Initiate security association and key exchange negotiations.
IPsec begins with the negotiation of security associations (SAs) and key exchange between peers.
List the three core security services of IPsec.
- Confidentiality
- Integrity
- Authentication
Confidentiality – Protects data by encrypting it.
Integrity – Ensures data is not altered using hashing.
Authentication – Verifies the sender’s identity.
What are the two main IPsec protocols?
- AH (Authentication Header)
- ESP (Encapsulating Security Payload)
AH – Provides authentication and integrity but no encryption.
ESP – Ensures authentication, integrity, and encrypts data for confidentiality.
Why is ESP preferred over AH?
ESP provides encryption.
AH only authenticates data, making ESP the better choice for securing transmitted information.
What are the two IPsec modes?
- Transport
- Tunnel
Transport Mode – Encrypts only the payload of the IP packet.
Tunnel Mode – Encrypts the entire IP packet for full protection.
True or False:
In transport mode, the IP header is encrypted.
False
Transport mode encrypts only the payload, leaving the original IP header visible.
Fill in the blank:
In IPsec ______ mode, both the IP header and payload are encrypted.
tunnel
Tunnel mode secures the entire packet and is widely used in site-to-site VPNs.
Define:
tunneling
The process of encapsulating packets within other packets.
Tunneling allows data to be securely transmitted over a public network (such as the Internet) by encapsulating the original data packets within encrypted IPsec packets, making them unreadable to unauthorized users.
What protocol negotiates IPsec security associations?
IKE
Internet Key Exchange (IKE) manages secure key exchanges for IPsec connections.
What happens in IKE Phase 1?
Secure communication is established.
Phase 1 sets up authentication and encryption for negotiating the main IPsec connection.
What happens in IKE Phase 2?
The IPsec tunnel is built.
Phase 2 defines the encryption and authentication settings used to secure data transfer.
What are the two IKE Phase 1 modes?
- Main
- Aggressive
Main Mode – Provides stronger security by establishing a secure connection in multiple steps.
Aggressive Mode – Completes the connection faster but exposes some security details.
Why is IKEv2 preferred over IKEv1 in IPsec VPNs?
It offers improved security and faster connection establishment.
IKEv2 provides better encryption support, faster key exchange, and stronger protection against attacks compared to IKEv1, making it more efficient for modern VPNs.
What is the role of a VPN concentrator?
It manages multiple VPN connections.
A VPN concentrator aggregates VPN connections, performing encryption and authentication for secure communication and commonly used in large-scale deployments.
Define:
remote access VPN
A VPN for individual users.
It allows employees or telecommuters to securely access a corporate network remotely.
What are two features of remote access VPNs that employ TLS?
- They facilitate secure connections for telecommuters to corporate networks.
- They utilize the TLS protocol for secure sessions.
Remote access VPNs allow users to connect securely to a corporate network, using the TLS protocol to create encrypted sessions.
Why do remote access VPNs use SSL instead of IPsec?
SSL VPNs offer easier access via standard web browsers.
SSL VPNs are designed to be accessible through standard web browsers, eliminating the need for specialized client software.
What are two protocols used for secure remote access VPNs?
- IPsec (Internet Protocol Security)
- TLS (Transport Layer Security)
IPsec – Secures all traffic between endpoints at the network layer, ideal for site-to-site connections.
SSL/TLS – Secures web traffic at the transport layer, works within web browsers for easy access.
What is the main difference between IPsec and SSL VPNs?
- IPsec operates at Layer 3
- SSL operates at Layer 4
IPsec VPNs secure traffic between two devices (e.g., routers), while SSL VPNs typically provide secure access to web applications through a browser, making them more user-friendly and easier to deploy.
True or False:
Remote access VPNs require a VPN gateway.
True
The VPN gateway authenticates users and encrypts transmitted data.
What device serves as a VPN gateway?
A router or firewall.
Routers or firewalls are commonly used to encrypt/decrypt traffic and enforce security policies between private networks or remote users.