Comparing Remote Access Methods Flashcards

(31 cards)

1
Q

Fiber to the curb vs fiber to the premises

A

Fiber to the curb goes to the cabinet near the customer’s house and fiber to the premises goes to the building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the good remote access policies

A
  1. Restrict to specific users and groups
  2. Limit times and days
  3. Limit network privileges
  4. Logging and auditing
  5. Keep systems updated
  6. Secure admin access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of VPN

A
  1. Host-to-Host VPN: allows an individual host on the Internet to establish a VPN connection with another host.
  2. Site-to-Site VPN: Allows two local network of hosts at different locations and each host can communicate with any other host at any location. Rather than requiring a VPN configuration for each one, you install a single device that handles VPN connections and packet encryption.
  3. Remote Access VPNs: individual hosts establish a VPN connection to a remote site. The client computer has to be able to establish the connection with a device called VPN concentrator that sits on the edge of the private network. VPN concentrators are hardware devices that are dedicated to establishing connections to hosts. Each host is configured with software often called a VPN client, that allows establishing connection between host and VPN concentrator.
  4. Clientless VPN: This type of VPN does not need a host to install VPN client software. instead, a host connects to the remote resource using a web browser. Access to the site is usually controlled with a simple username and password. This type of VPN is also known as an SSL VPN because it uses the secure sockets layer to encrypt data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tunneling Protocols

A
  1. Point-to-point Protocol: method to send data from one point to another over a direct connection, it encapsulates data so it can travel over this connection, but it doesn’t have security.
  2. Generic Routing Encapsulation (GRE): A method to put one packet inside another packet so it can travel across a network. It allows different kinds of network data to travel inside regular IP packets. No security by itself but can be combined with IPsec.
  3. IPsec: Secure way to send data over the Internet and encrypts an authenticates the data at the network layer so no one can read or modify it. Has strong security by locking the package with a special key.
  4. Transport Layer Security: A secure tunnel built on top of regular Internet connections like TCP (or UDP with DTLS). It encrypts the data traveling between two devices (like your web browser talking to a website).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPsec

A

It’s a framework of protocols designed to secure IP network communications. It provides services like encryption, authentication, and data integrity, ensuring secure data transmission, especially over potentially insecure networks like the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two core protocols of IPsec

A
  1. Authentication Header (AH): makes sure data hasn’t been changed. It uses a secret key + hash to create a signature. It does not encrypt data so if someone breaks the seal, they can read the data.
  2. Encapsulating Security Payload (ESP): Encrypts the data, keeping it secret and also checks if it has been modified.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Two modes of IPsec

A
  1. Transport mode: to secure communications between hosts on a private network. Payload data is encrypted but IP header is not.
  2. Tunnel mode: used for communications between VPN gateways across an insecure network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an IPsec policy

A

A set of rules that tell each device how to secure the connection. It sets the authentication mechanism and also the use of AH/ESP and transport or tunnel mode for a connection between two peers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Internet Key Exchange (IKE)

A

Framework for creating a security association (SA) used with IPSec. An SA establishes that two hosts trust one another (authenticate) and agree on secure protocols and cipher suites to use to exchange data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Two Phases of IKE:

A

Phase 1: Creates a secure channel using Diffie-Hellman key exchange. Authenticates each device using Digital certificates or Pre-Shared Key.
Phase 2: Chooses which encryption and hashing methods to use for VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Versions of IKE

A
  1. IKEv1: Site to site and host to host. It needs supporting protocols to implement remote access VPNs.
  2. IKEv2: Stand-alone remote access VPN. Allows network address translation (NAT) traversal and MOBIKE multihoming. NAT traversal makes it easier to configure a tunnel allowed by a home router/firewall. Multihoming means that a smartphone client with Wi-Fi and cellular interfaces can keep the IPSec connection alive when switching between them.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Multihoming

A

It means a smartphone with Wi-Fi and cellular interfaces can keep the IPSec connection alive when switching between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Client-to-Site VPN

A

VPN setup where a remote device (client) connects to a VPN gateway (at the company’s network).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VPN gateway

A

A VPN-enabled router/firewall at the company that manages VPN connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Split Tunnel

A

The client accesses the Internet directly using its ISP-managed IP configuration, routers, and DNS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Full Tunnel

A

Internet access is mediated by the corporate network, which will alter the client’s IP address and DNS servers and may use a proxy.

17
Q

HTML5 VPN or Clientless VPN

A

Using features of HTML5 to implement remote desktop/VPN connections via browser software (clientless). Also called clientless VPN.

18
Q

SSH

A

Cryptographic network protocol for secure communication of remote configuration and RDP

19
Q

SSH Authentication Methods

A
  1. Username/Password: Just logging in like logging into website or email.
  2. Public/Private keys: A private key stays safe on your computer; the public key is stored on the remote computer. Together, they unlock the door.
  3. Kerberos Authentication: Mostly used at companies. It uses a ticket you get when you log into your computer at work.
20
Q

What is a SSH Host key and what is it for?

A

Each SSH server has its own special fingerprint (host key) to prove it’s authentic.
Your computer remembers these keys so it knows it’s talking to the right remote computer.

21
Q

Important SSH Commands

A

sshd | ssh-keygen | ssh-copy-id | ssh-agent | ssh-add | ssh user@host | ssh host “command” | scp | sftp

22
Q

RDP

A

RDP creates a secure and encrypted remote connection and has a GUI.

23
Q

RDP vs. Telnet & SSH

A

Telnet and SSH are text base command line interface, but RDP sends screen/audio to client and accepts mouse/keyboard input.

24
Q

Telnet port

25
SSH port
22
26
RDP port
3389
27
Managed and unmanaged appliances
Managed ones are the ones we configure like firewalls routers and advanced switches. Unmanaged ones are the ones that we plug in and they are ready.
28
Ways to control management interfaces
1. Console Port: use a console cable to connect to a device and then use a command line to type commands directly. This method is local only. 2. AUX port: connect a modem to a device and then you can call the device over the phone line using that modem. Then you can use a terminal emulator to type commands. (redundant) 3. Management port: Allows remote configuration over the network. A virtual interface or a dedicated management port can be used to control devices.
29
Out-of-Band vs. In-Band
- OOB means using a separate, private connection just for management. Example: Using the console port or setting up a separate network for management. - In-Band: Management traffic shares the same network as regular internet traffic.
30
Jump Box/host/server
When we have devices that are exposed to the Internet directly like devices in DMZ, administrative access and configuration becomes risky and challenging. Jump Box. Jump box is placed in the secure zone of the network and administrator first connect to it using one protocol like SSH and then they connect to admin interfaces of other servers inside the secure zone. All application servers are set to only accept connections from the jump box.
31