Shared Flashcard Set

Details

CCIE Security 5
VPN
29
Engineering
Professional
11/15/2009

Additional Engineering Flashcards

 


 

Cards

Term

What are characteristics of Data Link layer VPN?

 

(cons)

Definition

Networks connected by a direct link over Frame Relay or ATM.

 

expensive; no inherent encryption.

Term
What are characteristics (and examples) of Application Layer VPN?
Definition

Works with specific applications.

 

User initiated; not seamless

 

SSL, SSH

Term

What are the characteristics of GRE?

 

(OSI layer, pro/cons)

Definition

Generic Routing Encapsulation

 

non-encrypted; low overhead tunneling

 

Encapsulates an arbitrary layer protocol over another arbitrary layer.

Term

What is the basic format of a GRE packet?

 

What is the header size and protocol type?

Definition

[delivery header | GRE header | payload ]

 

new IP/delivery header: 20 bytes

GRE header (base): 4 bytes, with optional fields that can add up to 12 additional bytes.

 

If the delivery header is IPv4, the protocol type = 47

Term
What is the format of the GRE header under RFC 1701?
Definition

[C|R|K|S|s|Recur|Flags|Ver|protocol type]

[   checksum (opt)        |offset (opt) ]

[              key (optional)           ]

[      sequence number (optional)       ]

[           routing (optional)          ]

 

C=1: both checksum & offset fields present

R=1: checksum, offset, routing present

protcol type = 0x800 if payload is IPv4

Term

What are the characteristics of L2TP?

 

(transport, pro/cons)

Definition

Layer 2 Tunneling Protocol

 

Used to tunnel PPP (L2) traffic over public network using IP (L3)

 

inherent authentication, no inherent encryption

Term
What are the devices/components in a L2TP tunnel and their function?
Definition

End host (initiating connection)

 

LAC (L2TP Access Concentrator) server - initiates tunnel

 

LNS (L2TP Network Server) - the remote device/end of the tunnel; performs AAA

 

Term
What are the basic steps in establishing a L2TP tunnel connection?
Definition

1. End host initiates connection to LAC server

 

2. LAC initiates tunnel to LNS

 

3. AAA takes place on LNS (local DB or AAA server)

Term
What protocol/port is used for the carrier/control traffic for L2TP?
Definition

Carrier using UDP

 

LAC initiates tunnel over UDP port 1701

Term

What are the characteristics/differences between

compulsory tunneling and voluntary tunneling

for L2TP?

 

What are the packet format sent from the client for each mode?

Definition

Compulsory: client unaware of tunnel

 

packet = [PPP | data]

 

Voluntary: client aware of tunnel; acts as LAC also

 

packet = [PPP | L2TP | data]

where the [L2TP | data] part is directly passed on by LAC without further processing

Term
What are the two stages of a L2TP tunnel connection?
Definition

1. Control session setup - set up between LAC & LNS; identifying peers and their L2TP version/etc

 

2. Session establishment - actual setup of tunnel for data transfer

Term

What are the characteristics of PPTP?

 

(transport, security)

Definition

Point-to-Point Tunneling Protocol

 

L2 tunneling protocol for Windows remote client over public network on TCP port 1723.

 

authentication (with PAP/CHAP/MS-CHAP using local/radius/tacacs+)

 

encryption (with Microsoft Point-to-Point Encryption / MPPE)

Term
What are the four functions/component services offered by IPSec?
Definition

Data Integrity (via hash algorithms)

 

Origin authentication (via IKE/D-H)

 

Anti-replay protection (sequence field & integrity checks)

 

Confidentiality (encryption)

Term

For IP Sec...

 

What encryption algorithms are supported?

 

What hash algorithms are supported?

 

Authentication mechanisms?

Definition

DES , 3DES, AES, RSA, preshared key/D-H

 

HMAC-MD5, HMAC-SHA-1

 

RSA/digital signatures, preshared key, nonces

Term
What are the main protocols for IPSec tunnels?
Definition

Internet Key Exchange / IKE (deployed with ESP)

 

Encapsulating Security Payload / ESP

 

Authentication Header / AH (rarely used; most of functionality is in ESP)

 

Term
What are the main differences between the AH and ESP protocols?
Definition

ESP protocol # 50, AH protocol # 51

 

ESP provides authentication and encryption in payload; AH does not provide encryption.

Term
What are the two modes of packet encapsulation for IPSec tunnels and their characteristics?
Definition

tunnel mode - entire IP packet (original L3 header + payload) is encapsulated/authenticated; so public srcIP/dstIP seen are of the VPN gateways

 

transport mode - no additional L3 header is created; only payload of IP packet is encrypted/authenticated; mainly for remote clients/host-host

Term
What occurs in the two phases of IKE?
Definition

Phase 1: Main or Aggressive Mode

- authenticates peers

- negotiates IKE Security Associate (SA)

- initiates secure tunnel

- generates encryption keys

 

Phase 2: Quick Mode

- negotiates set of security parameters for tunnel

- regenerates encryption keys (for ESP)

- creates the IPSec tunnel

Term

What are the characteristics of SSL VPN?

 

What OSI layer does it operate on?

Definition

Protocol to secure web (HTTP) traffic between end device and web server

 

Operates at session layer (L5)

Term
What are the key differences between IPSec and SSL VPNs?
Definition

IPSec provides protection for IP packets and protocols between networks/hosts.

 

SSL VPN provides protection for users' access to services and applications on a network.

Term
What are the steps for the RSA encrypted nonces authentication method?
Definition

1. Each peer generates a nonce (random number).

 

2. The nonces are encrypted and exchanged.

 

3. Each peer makes an authentication key from both nonces and some other info.

 

4. Generated key is run through hash.

 

5. The hash values of peers are compared (should be the same) for authentication.

Term
WHat does SSL VPNs use for authentication?
Definition

digital certificates

 

username/password combinations

Term
What is the purpose of PFS?
Definition

Perfect Forward Secrecy

 

Forces peers (if agreed) to generate new DH secret during Quick Mode

Term

What are the characteristics of NAT-T?

 

What is its role/purpose in IKE?

Definition

NAT Traversal

 

UDP port 4500

 

Encapsulates IPSec packet with another layer of UDP/IP headers. Allows IPSec packets to go through NAT (which is not possible with AH in transport mode)

Term
What is the format of the AH header in IPSec?
Definition

[next header|payload len| Reserved ]

[    security Param Index (SPI)    ]

[              seq #               ]

[             auth data...         ]

 

SPI - for SA ID

auth data - may contain additional padding for integrity check

Term
What is the format of the ESP header for IPSec?
Definition

[    Security Param. Index (SPI)    ]

[              Seq #                ]

[    Payload    ...   + ... padding ]

[      ...    | pad len |next header]

[            auth data ...          ]

 

SPI + IP => SA

Term

What are the available Diffie-Hellman groups?

 

When are they generally used?

Definition

dh-group [group-1 | group-2 | group-5 | group-7]

 

respectively: 768, 1024, 1536, 168 bits

 

For 1,2,5, the larger the slower but more secure

(eg for des, 3des, aes).

 

DH group 7 is special case that provides high security for devices with low processing power

Term
What transform set configuration options are available for ESP and AH in IPSec config
Definition

For ESP encryption: esp-null, esp-des, esp-3des, esp-aes, esp-aes 192, esp-aes 256, esp-aes seal

 

For ESP authentication: esp-md5-hmac, esp-sha-hmac

 

For AH: ah-md5-hmac, ah-md5-hmac

Term
What does RFC 4301 cover in general?
Definition

IPSec architecture

 

Implementation of IKE (ESP, AH, SAs, etc.)

Supporting users have an ad free experience!