Study sets matching "vpn"

Study sets
Classes
Users

Study sets matching "vpn"

5 terms
VPN
HMAC
AH
AES
DH
A mechanism that uses a hash function to verify the integrity…
An IPSec protocol that verifies the sending device and provid…
A symmetric encryption algorithm that can use a 128-bit, 192-…
A secure method of exchanging public encryption keys over a p…
HMAC
A mechanism that uses a hash function to verify the integrity…
AH
An IPSec protocol that verifies the sending device and provid…
17 terms
VPN
VPN Tunnel
Remote Access
Packet Encryption
IPsec
When two devices near the edge of the internet create a VPN
Connects individual internet users to the enterprise network
Original packet contents are undecipherable to anyone seeing…
A protocol that is used to secure and authenticate IP connect…
VPN Tunnel
When two devices near the edge of the internet create a VPN
Remote Access
Connects individual internet users to the enterprise network
VPN
Hash
Encryption algorithm
Diffie-Hellman (DH) Group
Authentication method
Message digest 5 algotieth (md5) or secure hash (SHA)
Digital Encryption Standard (DES), Triple DES (3DES), or Adva…
Used to establish a symmetric shared key via a public key exc…
Used for verifying the identity of the VPN peer on the other…
Hash
Message digest 5 algotieth (md5) or secure hash (SHA)
Encryption algorithm
Digital Encryption Standard (DES), Triple DES (3DES), or Adva…
8 terms
VPN
Intranet
Extranet
DES
Triple DES (3DES)
Site-to-site VPN that connects 2 sites of the same organization
Connects 2 sites of different, but partnering organizations
Data Encryption Standard... -key length: 56 bits... -older and less…
-key length: 56 x 3... -Applies 3 different 56-bit DES keys in s…
Intranet
Site-to-site VPN that connects 2 sites of the same organization
Extranet
Connects 2 sites of different, but partnering organizations
28 terms
VPN
VPN
Purpose of a VPN
The type of protocol used by VPN to cr…
Describe the server the VPN client tri…
Virtual Private Network
Creates a remote but secure point to point connection across…
VPN uses secure TCP/IP based protocols called tunnelling prot…
An internet facing remote access server.
VPN
Virtual Private Network
Purpose of a VPN
Creates a remote but secure point to point connection across…
8 terms
VPN
_____ is a logically defined networks…
Two types of VPNs
First tunnel in IPSec
Second tunnel in IPSec
VPN
site-to-site vpn, remote-access vpn
IKE Phase 1 Tunnel
IKE Phase 2 Tunnel
_____ is a logically defined networks…
VPN
Two types of VPNs
site-to-site vpn, remote-access vpn
VPN
DES
Triple DES
AES
Virtual Private Network... Tunnel
Data Encryption Standard ... From the 70s... Single 56bit key, easi…
Uses 3 different 56bit keys
Advanced Encryption Standard ... Can run on any Cisco router tha…
VPN
Virtual Private Network... Tunnel
DES
Data Encryption Standard ... From the 70s... Single 56bit key, easi…
VPN
Was muss eine VPN sicherstellen?
Authentizität(Echtheit)
Vertraulichkeit
Integrität
Authentizität(Echtheit), Vertraulichkeit, Integrität
Ziel und Quelle müssen bekannt sein. Es muss sichergestellt w…
Die Daten dürfen von "außen" nicht lesbar sein. (Verschlüsslu…
Es wird sichergestellt, dass die Daten nicht manipuliert wurd…
Was muss eine VPN sicherstellen?
Authentizität(Echtheit), Vertraulichkeit, Integrität
Authentizität(Echtheit)
Ziel und Quelle müssen bekannt sein. Es muss sichergestellt w…
9 terms
VPNs
DMVPN
DMVPN hub-to-spoke tunnels
DMVPN spoke-to-spoke tunnels
DMVPN component technologies
Dynamic Multipoint VPN. A Cisco software solution for buildin…
spoke sites, such as branch offices, connect directly with a…
spoke sites can connect directly with other spoke sites witho…
1. Next Hop Resolution Protocol (NHRP)... 2. Multipoint Generic…
DMVPN
Dynamic Multipoint VPN. A Cisco software solution for buildin…
DMVPN hub-to-spoke tunnels
spoke sites, such as branch offices, connect directly with a…
24 terms
VPNs
VPN Benefits
Types of VPNs
Site-to-site VPN
Remote-access VPN
Cost savings... Security... Scalability... Compatability w/broadband t…
Site-to-site... Remote-access
connects entire networks together... hosts within the networks a…
connection between individual hosts and a main office's VPN g…
VPN Benefits
Cost savings... Security... Scalability... Compatability w/broadband t…
Types of VPNs
Site-to-site... Remote-access
VPNs
DMVPN
DMVPN hub-to-spoke tunnels
DMVPN spoke-to-spoke tunnels
DMVPN component technologies
Dynamic Multipoint VPN. A Cisco software solution for buildin…
spoke sites, such as branch offices, connect directly with a…
spoke sites can connect directly with other spoke sites witho…
1. Next Hop Resolution Protocol (NHRP)... 2. Multipoint Generic…
DMVPN
Dynamic Multipoint VPN. A Cisco software solution for buildin…
DMVPN hub-to-spoke tunnels
spoke sites, such as branch offices, connect directly with a…
VPNs
Site-to-site
PPP
PPTP
Host-to-host VPNS
Encrypt traffic between sites, no new software, need hardware…
Authentication, compression, error detection, multilink, no e…
Controls the tunnel, uses GRE- generic routing encapsulation.…
Software based, no hardware needed
Site-to-site
Encrypt traffic between sites, no new software, need hardware…
PPP
Authentication, compression, error detection, multilink, no e…
11 terms
VPNs
What is a VPN?
endpoints
PPTP VPN
RRAS
encrypted tunnels between a computer or a remote network and…
ends of the VPN tunnel where data is encrypted/decrypted
Point to point tunneling protocol VPN
Routing and Remote Access Service... - RRAS is a special access…
What is a VPN?
encrypted tunnels between a computer or a remote network and…
endpoints
ends of the VPN tunnel where data is encrypted/decrypted
VPNs
What is a VPN?
Security goals of a VPN?
What is commonly used to run a VPN?
What VPN architecture protects communi…
A virtual network built on top of existing physical networks…
Confidentiality... Integrity... Data Origin Authentication... Replay p…
IPsec
Gateway-to-gateway
What is a VPN?
A virtual network built on top of existing physical networks…
Security goals of a VPN?
Confidentiality... Integrity... Data Origin Authentication... Replay p…
8 terms
VPNs
Which of the following protocols can y…
IPSec is implemented through two separ…
A VPN is sued primarily for what purpo…
You want to allow traveling users to c…
PPTP.... L2TP.
AH.... ESP.
Support secured communications over a trusted network.
SSL
Which of the following protocols can y…
PPTP.... L2TP.
IPSec is implemented through two separ…
AH.... ESP.
VPN Protocols
SSL
PPTP
GRE
IPSec
Secure Sockets Layer
Point-to-point Tunneling Protocol
Generic Routing Encapsulation
Internet Protocol Security
SSL
Secure Sockets Layer
PPTP
Point-to-point Tunneling Protocol
33 terms
VPN Connections
Point-to-Point Tunneling Protocol (PPTP)
Point-to-Point Tunneling Protocol (PPTP)
Point-to-Point Tunneling Protocol (PPTP)
Point-to-Point Tunneling Protocol (PPTP)
Supports TCP/IP only.
Uses TCP port 1723
Uses standard authentication protocols, such as Challenge Han…
Uses Microsoft's MPPE for data encryption
Point-to-Point Tunneling Protocol (PPTP)
Supports TCP/IP only.
Point-to-Point Tunneling Protocol (PPTP)
Uses TCP port 1723
10 terms
VPN Fundamentals
Virtual Private Network (VPN)
Remote Control
Remote Access
Important Concerns of secure VPNs
A mechanism to establish a secure remote access connection ac…
The ability to use a local computer system to remotely take o…
A link that enables access to network resources using a WAN l…
All VPN traffic must be authenticated and encrypted... All VPN e…
Virtual Private Network (VPN)
A mechanism to establish a secure remote access connection ac…
Remote Control
The ability to use a local computer system to remotely take o…
16 terms
VPN Facts
PPTP
SSL
IPSec
L2TP
uses standard authentication protocols (CHAP, PAP)
authenticates the server to the client using public key crypt…
provides authentication and encryption and can be used in con…
open standard for secure multi-protocol routing
PPTP
uses standard authentication protocols (CHAP, PAP)
SSL
authenticates the server to the client using public key crypt…
15 terms
Linux-VPN
1.Command to install openvpn and openssl
2.Enter openvpn directory
3.copy sample easy rsa file version 2…
4.modify vars file using vi assuming p…
yum install openvpn openssl
cd /etc/openvpn
cp -r /usr/share/doc/openvpn/examples/easy-rsa/2.0/easy-rsa .…
vi easy-rsa/vars
1.Command to install openvpn and openssl
yum install openvpn openssl
2.Enter openvpn directory
cd /etc/openvpn
General VPN
VPN
Site-to-site
Remote-access
VPN Benefits
Provides confidentiality, integrity, authentication
Transparent to communicating hosts (they don't know they're u…
Individual users logging into the main office (Work at home V…
Security - Through encryption and authentication protocols... Sc…
VPN
Provides confidentiality, integrity, authentication
Site-to-site
Transparent to communicating hosts (they don't know they're u…
vpn protocols
point to point protocol (PPP)
point to point tunneling protocol (PPTP)
generic routing encapsulation (GRE)
secure sockets layer vpn (SSL VPN)
layer 2 authentication, compression, error detection protocol
controls the tunnel.
the tunnel controls by PPTP
uses common SSL protocol, no big vpn clients
point to point protocol (PPP)
layer 2 authentication, compression, error detection protocol
point to point tunneling protocol (PPTP)
controls the tunnel.
7 terms
VPN Protocols
ppp
pptp
GRE
ms chapv2
point to point protocol
point to point tunneling
generic routing encapsulation
Microsoft challenge handshake authentication protocol
ppp
point to point protocol
pptp
point to point tunneling
12 terms
VPN Protocols
SSL
PPTP
GRE
IPSec
Secure Sockets Layer
Point-to-point Tunneling Protocol
Generic Routing Encapsulation
Internet Protocol Security
SSL
Secure Sockets Layer
PPTP
Point-to-point Tunneling Protocol
VPN / IPsec
Allows the creation of private network…
VPN's that allow remote users such as…
VPNs that allow a company to connect i…
VPNs that allow an organizations suppl…
Virtual private network (VPN)
Remote access VPNs
Site-to-site VPNs
Extranet VPNs
Allows the creation of private network…
Virtual private network (VPN)
VPN's that allow remote users such as…
Remote access VPNs
VPN Quiz
IKE Phase 1 or 2:... DH Key exchange
IKE Phase 1 or 2:... Establish IPSec SAs
IKE Phase 1 or 2:... Negotiate IPSec secu…
IKE Phase 1 or 2:... Negotiate IKE policy…
...
...
...
...
IKE Phase 1 or 2:... DH Key exchange
...
IKE Phase 1 or 2:... Establish IPSec SAs
...
265 terms
IT 237 FirewWall VPN Security- Adamecz
What kind of protocol is OSPF? (Select…
What command filters all outgoing LSA…
What is the Default Value for IKEv1 Ha…
What are the three optional steps in c…
A. Link state... D. Routing
D. ospf database-filter all out
A. SHA-1
A. Configure traffic filtering... B. Bypass NAT... C. Enable Perfec…
What kind of protocol is OSPF? (Select…
A. Link state... D. Routing
What command filters all outgoing LSA…
D. ospf database-filter all out
VPN 3280
Which of the following terms refers to…
Which of the following are not conside…
Which of the following is not a functi…
Virtual Private Network (VPN)
Intranet VPN
Antivirus
Intrusion prevention
Creates a private connection (tunnel) between the remote user…
Which of the following terms refers to…
Intranet VPN
Which of the following are not conside…
Antivirus
11 terms
Freedome VPN
Help protect your privacy on public Wi…
Freedome VPN discount for Comcast Subs…
How to install Freedome VPN on your mo…
How long is the free trial of Freedome…
Freedome VPN
25%
Go to ConstantGuard.Comcast.net > click on Freedome VPN > Fol…
30 days
Help protect your privacy on public Wi…
Freedome VPN
Freedome VPN discount for Comcast Subs…
25%
16 terms
CCND-VPN
Encrypts the whole packet
Encrypts only the header
IPsec is implemented on what layer
The functions of a VPN Concentrator
ESP
AH
network layer
1. Data encryption and encapsulation... 2. Managing tunnels... 3. U…
Encrypts the whole packet
ESP
Encrypts only the header
AH
30 terms
Topic 9, VPN Technologies
QUESTION NO: 158... Under which higher-l…
QUESTION NO: 159... Which two functions…
QUESTION NO: 160... Which two statements…
QUESTION NO: 161... Which option describ…
C. remote access policy
C. using IKE to negotiate the SA... E. using Diffie-Hellman to…
A. Asymmetric algorithms are used for authentication and key…
D. used to establish a symmetric shared key via a public key…
QUESTION NO: 158... Under which higher-l…
C. remote access policy
QUESTION NO: 159... Which two functions…
C. using IKE to negotiate the SA... E. using Diffie-Hellman to…
9 terms
VPN Quizlet
DMVPN
DMVPN 中心辐射型隧道
DMVPN 分支到分支隧道
DMVPN 组件技术
动态多点 VPN。以简单、动态和灵活的方式构建多个 VPN 的思科软件解决方案
分支站点(例如分支机构)直接连接到一个中枢站点(例如总部
分支站点可以直接连接到其他分支站点,而无需通过中心路由器
1.下一跳解析协议 (NHRP)... 2.多点通用路由封装 (mGRE) 隧道... 3.IP 安全 (IPsec) 加密
DMVPN
动态多点 VPN。以简单、动态和灵活的方式构建多个 VPN 的思科软件解决方案
DMVPN 中心辐射型隧道
分支站点(例如分支机构)直接连接到一个中枢站点(例如总部
VPN and Security
HMAC
AH
AES
DH
Hash Based Message Authentication Code- Hash function to veri…
Authentication Header- Verifies sending device and provides d…
Advanced Encryption Standard- Symmetric encryption algorithm,…
Diffie Hellman- Secure key exchange over public net
HMAC
Hash Based Message Authentication Code- Hash function to veri…
AH
Authentication Header- Verifies sending device and provides d…
7 terms
Conceptos de VPN
VPN
Encriptado Asimetrico
Radius
AAA
Red privada virtual
Utiliza dos llaves para comunicarse, la privada del emisor y…
Protocolo AAA
Autentication, Autorization and Accounting
VPN
Red privada virtual
Encriptado Asimetrico
Utiliza dos llaves para comunicarse, la privada del emisor y…
70 terms
Chapter 3 VPN Fundamentals
Algorithm
Asymmetric cryptography
Authentication, authorization, and acc…
Authenticity
A set of rules and procedures, usually mathematical in nature…
A means of encoding and information using related but differe…
Programs used to control access to computer resources, enforc…
The security service of the combination of authentication and…
Algorithm
A set of rules and procedures, usually mathematical in nature…
Asymmetric cryptography
A means of encoding and information using related but differe…
VPN Protocols
IPsec
IPsec 3 Main Protocols
Internet Key Exchange (IKE)
Encapsulating Security Protocol (ESP)
Uses three main protocols to create a security framework to u…
1. Internet Key Exchange (IKE)... 2. Encapsulating Security Prot…
This provides a framework for negotiation of the security par…
Provides a framework for encrypting, authenticating, & securi…
IPsec
Uses three main protocols to create a security framework to u…
IPsec 3 Main Protocols
1. Internet Key Exchange (IKE)... 2. Encapsulating Security Prot…
Chapter 7 VPN Overview
Objectives
leased line
Layer 2
tunneling, encryption
VPN Concepts ... key vpn technologies... typical vpn types and appl…
Traditional VPN networking mainly uses two modes: ____ VPN an…
A leased line VPN is a _____ VPN that is built through a digi…
common VPN tecjnologies... _____ ... key management... _____-... data aut…
Objectives
VPN Concepts ... key vpn technologies... typical vpn types and appl…
leased line
Traditional VPN networking mainly uses two modes: ____ VPN an…
12 terms
VPN and IPSec
Transport Mode
Tunnel Mode
IPSec - Main Mode
IPsec - Aggressive Mode
Original IP header not visible. Used for client-to-site.
Original IP header is visible. Used for site-to-site.
3 exchanges between IPsec peers. Uses DH. Establishes ISAKMP…
Faster than main mode. Establishes ISAKMP session.
Transport Mode
Original IP header not visible. Used for client-to-site.
Tunnel Mode
Original IP header is visible. Used for site-to-site.
10 terms
Chapter 11 - VPN Concept
Which of the following is NOT an essen…
Which of the following is a type of VP…
Which of the following is NOT true abo…
Which of the following is true about s…
Authentication server
Client-to-site
Have more security vulnerabilities than software VPNs
best when all router and firewall hardware is the same
Which of the following is NOT an essen…
Authentication server
Which of the following is a type of VP…
Client-to-site
Dos,DDos,VPN,IDS
DoS
SYN Flood
Ping Flood
Smurf
attack is an attempt to defeat availability, the third of the…
attacker sends(TCP) successions of syn requests to target a s…
Node receiving a ping packet is expected to generate a... reply,…
Spoof (source) address of sender end node in ping packet by s…
DoS
attack is an attempt to defeat availability, the third of the…
SYN Flood
attacker sends(TCP) successions of syn requests to target a s…
13 terms
Network Storage and VPN Protocols
A technology that transmits data of up…
An IP-based protocol used to communica…
What is one advantage of iSCSI over Fi…
What OSI layer does FCoE run at?
Fiber Channel
Internet Small Computer Systems Interface iSCSI
Special hardware is not needed to connect to the shared disk…
Layer 2
A technology that transmits data of up…
Fiber Channel
An IP-based protocol used to communica…
Internet Small Computer Systems Interface iSCSI
42 terms
VPNs and Tunneling
Tunneling
VPN
Multiplexing
Demultiplexing
The act of encapsulating a packet from one protocol into anot…
A networking infrastructure whereby a private network makes u…
The combining of multiple distinct entities into a larger con…
The extraction of distinct entities from a larger containing…
Tunneling
The act of encapsulating a packet from one protocol into anot…
VPN
A networking infrastructure whereby a private network makes u…
Different Types of Networks/VPN
A network is a group of __________comp…
LAN = +
WAN = +
A WAN is two or more ___________ netwo…
two or more
Local Area Network The computers are geographically close tog…
Wide-area network (WAN): The computers are farther apart and…
LAN's
A network is a group of __________comp…
two or more
LAN = +
Local Area Network The computers are geographically close tog…
84 terms
IPSec VPNs
ESP
AH (Authentication Headers)
ESP IPSec Tunnel Mode (Site-to-Site)
ESP IPSec Transport Mode (Site-to-Site)
Layer 4 protocol. Provides confidentiality (encryption), inte…
Layer 4 protocol. Provides integrity, authentication, and pro…
Is the default mode... The entire IP packet (IP header and paylo…
Is not the default mode. Needs to be specified in the crypto…
ESP
Layer 4 protocol. Provides confidentiality (encryption), inte…
AH (Authentication Headers)
Layer 4 protocol. Provides integrity, authentication, and pro…
Clientless SSL VPN (Clientless Remote Access VPN)
Clientless SSL VPN General
Clientless SSL VPN: Connecting
Proxy
Clientless SSL VPN Accessible "Interna…
Uses just a browser which means it does not require an Admini…
You absolutely must use https to connect to the ASA's outside…
Protects internal devices because it does not give complete c…
Web-based applications (Not all applications are supported)... C…
Clientless SSL VPN General
Uses just a browser which means it does not require an Admini…
Clientless SSL VPN: Connecting
You absolutely must use https to connect to the ASA's outside…
6.7 VPN's
Which IPsec subprotocol provides data…
PPTP is quickly becoming obsolete beca…
You have a group of salesmen who would…
Which VPN protocol typically employs I…
ESP
L2TP
VPN concentrator
L2TP
Which IPsec subprotocol provides data…
ESP
PPTP is quickly becoming obsolete beca…
L2TP
Chapter 8 IPSec VPN
IPSec, IKE
anti-replay, authenticity
hosts
security payload
Objectives:... ___ basics... AH ans ESP... ____... Service flow of the pr…
IPSec features: ... confidentiality... _____... ___... integrity
Encapsulations modes scenarios, Transport: ... host and gateways…
Complete the meaning of the initials ESP :encapsulating ____…
IPSec, IKE
Objectives:... ___ basics... AH ans ESP... ____... Service flow of the pr…
anti-replay, authenticity
IPSec features: ... confidentiality... _____... ___... integrity
Rob -VPNs
Benefits of VPNs
2 types of VPNs
What is GRE?
cmds to configure a GRE tunnel
Cheap vs WANs, Scalability, compatibility with broadband tech…
Site to Site and Remote Access... Site to Site is between 2 netw…
Generic routing encapsulation.... made by cisco... encapsulates all…
interface tunnel0... tunnel mode gre ip... ip address x.x.x.x... tunne…
Benefits of VPNs
Cheap vs WANs, Scalability, compatibility with broadband tech…
2 types of VPNs
Site to Site and Remote Access... Site to Site is between 2 netw…
MPLS & VPNs
Inet.3
mpls.0
bgp.layer3vpn.0
An identifier attached to a route, des…
This routing table holds the RSVP and LDP routes, relevant fo…
Mpls switching table
This routing table stores all the vpnv4 unicast routes receiv…
What is a route destinguisher?
Inet.3
This routing table holds the RSVP and LDP routes, relevant fo…
mpls.0
Mpls switching table
11 terms
Chapter 7: VPN
What is a virtual private network?
What is a benefit of a VPN?
How are VPNs created? (what are needed?)
What are the advantages of VPNs?
A private network that uses a public network to connect users
Extend the reach of the organisation's networks
Log-ins, encryption
Allow remote uses to access company network, allow flexibilit…
What is a virtual private network?
A private network that uses a public network to connect users
What is a benefit of a VPN?
Extend the reach of the organisation's networks
1 of 10