Domain 4 simple Flashcards
Internet Key Exchange uses diffie-hellman style of negotiation Use public key certificates
IKE
IP Security
IPSec
UDP port 500
Which Port is IPSEC on
Tunnel is created and is the “production channel”
Phase 2 of IPSec
old combined fields 3,4 and payload
What gets hashed in ESP Auth
Negotiation of tunnel
Phase 1 of IPsec
Security Parameter Index (SPI) is an identification tag added to the header while using IPsec for tunneling the IP traffic
Define SPI in IPSec
Layer 2 tunneling protocol
L2TP
Layer 3
what layer does IPSec operate on
Encapsulating Security Payload
ESP
There could be duplicate IPs
When Combining two systems on a network with IPSec the risk
Request for Comment 1918 (RFC 1918), “Address Allocation for Private Internets,”
Define RFC 1918
Maximum Transmission Units
MTU
Point-to-point tunneling protocol
PPTP
Contains info showing which security association to ue and the packet sequence number
ESP Header
Multi-protocol label switching
MPLS
Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on short path labels rather than long network addresses
Define MPLS
Contains the encrypted part of the packet. If the encryption to use when the security association is establsihed
ESP Payload
Internet security association key management protocol
ISAKMP
Bi Directional. RFC 2048
Characteristics of ISAKMP
May include padding (filler bytes) if requires by the encryption ALGO or to align fields
ESP Trailer
This field contains the integrity check (hash) of the ESP packet.
Authentication field (ESP Auth)
- Sender created segment with port address set to 5002. sender sends segment to device that is set to create and ipsec tunnel if “interesting traffic” shows up3. interesting traffic arrives at device, device looks at layer 3 header and figures out where its going to tunnel to4. device invokes ISAKMP and builds bi-directional tunnel5. If key pairs, uses diffie hellmen called ISAKMP-Oakily6. Security Parameter Index appears on each device7. Enter Phase 2, creates permanent tunnel8. Data is then passed between phase 2 tunnel
Steps of IPSec
Replaced SAS 70Auditing Standard. Replaced by SSAE18
SSAE 16