How can we help?

You can also find more resources in our Help Center.

Study sets matching "vpn"

Study sets
Classes
Users

Study sets matching "vpn"

28 terms
VPN
VPN
Purpose of a VPN
The type of protocol used by VPN to cr…
Describe the server the VPN client tri…
Virtual Private Network
Creates a remote but secure point to point connection across…
VPN uses secure TCP/IP based protocols called tunnelling prot…
An internet facing remote access server.
VPN
Virtual Private Network
Purpose of a VPN
Creates a remote but secure point to point connection across…
5 terms
VPN
Hash
Encryption algorithm
Diffie-Hellman (DH) Group
Authentication method
Message digest 5 algotieth (md5) or secure hash (SHA)
Digital Encryption Standard (DES), Triple DES (3DES), or Adva…
Used to establish a symmetric shared key via a public key exc…
Used for verifying the identity of the VPN peer on the other…
Hash
Message digest 5 algotieth (md5) or secure hash (SHA)
Encryption algorithm
Digital Encryption Standard (DES), Triple DES (3DES), or Adva…
VPN
VPN
DES
Triple DES
AES
Virtual Private Network... Tunnel
Data Encryption Standard ... From the 70s... Single 56bit key, easi…
Uses 3 different 56bit keys
Advanced Encryption Standard ... Can run on any Cisco router tha…
VPN
Virtual Private Network... Tunnel
DES
Data Encryption Standard ... From the 70s... Single 56bit key, easi…
17 terms
VPN
VPN Tunnel
Remote Access
Packet Encryption
IPsec
When two devices near the edge of the internet create a VPN
Connects individual internet users to the enterprise network
Original packet contents are undecipherable to anyone seeing…
A protocol that is used to secure and authenticate IP connect…
VPN Tunnel
When two devices near the edge of the internet create a VPN
Remote Access
Connects individual internet users to the enterprise network
10 terms
VPN
Was muss eine VPN sicherstellen?
Authentizität(Echtheit)
Vertraulichkeit
Integrität
Authentizität(Echtheit), Vertraulichkeit, Integrität
Ziel und Quelle müssen bekannt sein. Es muss sichergestellt w…
Die Daten dürfen von "außen" nicht lesbar sein. (Verschlüsslu…
Es wird sichergestellt, dass die Daten nicht manipuliert wurd…
Was muss eine VPN sicherstellen?
Authentizität(Echtheit), Vertraulichkeit, Integrität
Authentizität(Echtheit)
Ziel und Quelle müssen bekannt sein. Es muss sichergestellt w…
8 terms
VPN
Intranet
Extranet
DES
Triple DES (3DES)
Site-to-site VPN that connects 2 sites of the same organization
Connects 2 sites of different, but partnering organizations
Data Encryption Standard... -key length: 56 bits... -older and less…
-key length: 56 x 3... -Applies 3 different 56-bit DES keys in s…
Intranet
Site-to-site VPN that connects 2 sites of the same organization
Extranet
Connects 2 sites of different, but partnering organizations
8 terms
VPN
_____ is a logically defined networks…
Two types of VPNs
First tunnel in IPSec
Second tunnel in IPSec
VPN
site-to-site vpn, remote-access vpn
IKE Phase 1 Tunnel
IKE Phase 2 Tunnel
_____ is a logically defined networks…
VPN
Two types of VPNs
site-to-site vpn, remote-access vpn
9 terms
VPNs
DMVPN
DMVPN hub-to-spoke tunnels
DMVPN spoke-to-spoke tunnels
DMVPN component technologies
Dynamic Multipoint VPN. A Cisco software solution for buildin…
spoke sites, such as branch offices, connect directly with a…
spoke sites can connect directly with other spoke sites witho…
1. Next Hop Resolution Protocol (NHRP)... 2. Multipoint Generic…
DMVPN
Dynamic Multipoint VPN. A Cisco software solution for buildin…
DMVPN hub-to-spoke tunnels
spoke sites, such as branch offices, connect directly with a…
24 terms
VPNs
VPN Benefits
Types of VPNs
Site-to-site VPN
Remote-access VPN
Cost savings... Security... Scalability... Compatability w/broadband t…
Site-to-site... Remote-access
connects entire networks together... hosts within the networks a…
connection between individual hosts and a main office's VPN g…
VPN Benefits
Cost savings... Security... Scalability... Compatability w/broadband t…
Types of VPNs
Site-to-site... Remote-access
9 terms
VPNs
DMVPN
DMVPN hub-to-spoke tunnels
DMVPN spoke-to-spoke tunnels
DMVPN component technologies
Dynamic Multipoint VPN. A Cisco software solution for buildin…
spoke sites, such as branch offices, connect directly with a…
spoke sites can connect directly with other spoke sites witho…
1. Next Hop Resolution Protocol (NHRP)... 2. Multipoint Generic…
DMVPN
Dynamic Multipoint VPN. A Cisco software solution for buildin…
DMVPN hub-to-spoke tunnels
spoke sites, such as branch offices, connect directly with a…
11 terms
VPNs
What is a VPN?
endpoints
PPTP VPN
RRAS
encrypted tunnels between a computer or a remote network and…
ends of the VPN tunnel where data is encrypted/decrypted
Point to point tunneling protocol VPN
Routing and Remote Access Service... - RRAS is a special access…
What is a VPN?
encrypted tunnels between a computer or a remote network and…
endpoints
ends of the VPN tunnel where data is encrypted/decrypted
6 terms
VPNs
What is a VPN?
Security goals of a VPN?
What is commonly used to run a VPN?
What VPN architecture protects communi…
A virtual network built on top of existing physical networks…
Confidentiality... Integrity... Data Origin Authentication... Replay p…
IPsec
Gateway-to-gateway
What is a VPN?
A virtual network built on top of existing physical networks…
Security goals of a VPN?
Confidentiality... Integrity... Data Origin Authentication... Replay p…
33 terms
VPN Connections
Point-to-Point Tunneling Protocol (PPTP)
Point-to-Point Tunneling Protocol (PPTP)
Point-to-Point Tunneling Protocol (PPTP)
Point-to-Point Tunneling Protocol (PPTP)
Supports TCP/IP only.
Uses TCP port 1723
Uses standard authentication protocols, such as Challenge Han…
Uses Microsoft's MPPE for data encryption
Point-to-Point Tunneling Protocol (PPTP)
Supports TCP/IP only.
Point-to-Point Tunneling Protocol (PPTP)
Uses TCP port 1723
VPN Protocols
SSL
PPTP
GRE
IPSec
Secure Sockets Layer
Point-to-point Tunneling Protocol
Generic Routing Encapsulation
Internet Protocol Security
SSL
Secure Sockets Layer
PPTP
Point-to-point Tunneling Protocol
15 terms
Linux-VPN
1.Command to install openvpn and openssl
2.Enter openvpn directory
3.copy sample easy rsa file version 2…
4.modify vars file using vi assuming p…
yum install openvpn openssl
cd /etc/openvpn
cp -r /usr/share/doc/openvpn/examples/easy-rsa/2.0/easy-rsa .…
vi easy-rsa/vars
1.Command to install openvpn and openssl
yum install openvpn openssl
2.Enter openvpn directory
cd /etc/openvpn
10 terms
VPN Fundamentals
Virtual Private Network (VPN)
Remote Control
Remote Access
Important Concerns of secure VPNs
A mechanism to establish a secure remote access connection ac…
The ability to use a local computer system to remotely take o…
A link that enables access to network resources using a WAN l…
All VPN traffic must be authenticated and encrypted... All VPN e…
Virtual Private Network (VPN)
A mechanism to establish a secure remote access connection ac…
Remote Control
The ability to use a local computer system to remotely take o…
9 terms
VPN Quizlet
DMVPN
DMVPN 中心辐射型隧道
DMVPN 分支到分支隧道
DMVPN 组件技术
动态多点 VPN。以简单、动态和灵活的方式构建多个 VPN 的思科软件解决方案
分支站点(例如分支机构)直接连接到一个中枢站点(例如总部
分支站点可以直接连接到其他分支站点,而无需通过中心路由器
1.下一跳解析协议 (NHRP)... 2.多点通用路由封装 (mGRE) 隧道... 3.IP 安全 (IPsec) 加密
DMVPN
动态多点 VPN。以简单、动态和灵活的方式构建多个 VPN 的思科软件解决方案
DMVPN 中心辐射型隧道
分支站点(例如分支机构)直接连接到一个中枢站点(例如总部
12 terms
VPN Protocols
SSL
PPTP
GRE
IPSec
Secure Sockets Layer
Point-to-point Tunneling Protocol
Generic Routing Encapsulation
Internet Protocol Security
SSL
Secure Sockets Layer
PPTP
Point-to-point Tunneling Protocol
16 terms
VPN Facts
PPTP
SSL
IPSec
L2TP
uses standard authentication protocols (CHAP, PAP)
authenticates the server to the client using public key crypt…
provides authentication and encryption and can be used in con…
open standard for secure multi-protocol routing
PPTP
uses standard authentication protocols (CHAP, PAP)
SSL
authenticates the server to the client using public key crypt…
265 terms
IT 237 FirewWall VPN Security- Adamecz
What kind of protocol is OSPF? (Select…
What command filters all outgoing LSA…
What is the Default Value for IKEv1 Ha…
What are the three optional steps in c…
A. Link state... D. Routing
D. ospf database-filter all out
A. SHA-1
A. Configure traffic filtering... B. Bypass NAT... C. Enable Perfec…
What kind of protocol is OSPF? (Select…
A. Link state... D. Routing
What command filters all outgoing LSA…
D. ospf database-filter all out
11 terms
VPN / IPsec
Allows the creation of private network…
VPN's that allow remote users such as…
VPNs that allow a company to connect i…
VPNs that allow an organizations suppl…
Virtual private network (VPN)
Remote access VPNs
Site-to-site VPNs
Extranet VPNs
Allows the creation of private network…
Virtual private network (VPN)
VPN's that allow remote users such as…
Remote access VPNs
11 terms
General VPN
VPN
Site-to-site
Remote-access
VPN Benefits
Provides confidentiality, integrity, authentication
Transparent to communicating hosts (they don't know they're u…
Individual users logging into the main office (Work at home V…
Security - Through encryption and authentication protocols... Sc…
VPN
Provides confidentiality, integrity, authentication
Site-to-site
Transparent to communicating hosts (they don't know they're u…
18 terms
VPN 3280
Which of the following terms refers to…
Which of the following are not conside…
Which of the following is not a functi…
Virtual Private Network (VPN)
Intranet VPN
Antivirus
Intrusion prevention
Creates a private connection (tunnel) between the remote user…
Which of the following terms refers to…
Intranet VPN
Which of the following are not conside…
Antivirus
11 terms
Freedome VPN
Help protect your privacy on public Wi…
Freedome VPN discount for Comcast Subs…
How to install Freedome VPN on your mo…
How long is the free trial of Freedome…
Freedome VPN
25%
Go to ConstantGuard.Comcast.net > click on Freedome VPN > Fol…
30 days
Help protect your privacy on public Wi…
Freedome VPN
Freedome VPN discount for Comcast Subs…
25%
9 terms
VPN Protocols
IPsec
IPsec 3 Main Protocols
Internet Key Exchange (IKE)
Encapsulating Security Protocol (ESP)
Uses three main protocols to create a security framework to u…
1. Internet Key Exchange (IKE)... 2. Encapsulating Security Prot…
This provides a framework for negotiation of the security par…
Provides a framework for encrypting, authenticating, & securi…
IPsec
Uses three main protocols to create a security framework to u…
IPsec 3 Main Protocols
1. Internet Key Exchange (IKE)... 2. Encapsulating Security Prot…
30 terms
Topic 9, VPN Technologies
QUESTION NO: 158... Under which higher-l…
QUESTION NO: 159... Which two functions…
QUESTION NO: 160... Which two statements…
QUESTION NO: 161... Which option describ…
C. remote access policy
C. using IKE to negotiate the SA... E. using Diffie-Hellman to…
A. Asymmetric algorithms are used for authentication and key…
D. used to establish a symmetric shared key via a public key…
QUESTION NO: 158... Under which higher-l…
C. remote access policy
QUESTION NO: 159... Which two functions…
C. using IKE to negotiate the SA... E. using Diffie-Hellman to…
16 terms
CCND-VPN
Encrypts the whole packet
Encrypts only the header
IPsec is implemented on what layer
The functions of a VPN Concentrator
ESP
AH
network layer
1. Data encryption and encapsulation... 2. Managing tunnels... 3. U…
Encrypts the whole packet
ESP
Encrypts only the header
AH
12 terms
VPN and IPSec
Transport Mode
Tunnel Mode
IPSec - Main Mode
IPsec - Aggressive Mode
Original IP header not visible. Used for client-to-site.
Original IP header is visible. Used for site-to-site.
3 exchanges between IPsec peers. Uses DH. Establishes ISAKMP…
Faster than main mode. Establishes ISAKMP session.
Transport Mode
Original IP header not visible. Used for client-to-site.
Tunnel Mode
Original IP header is visible. Used for site-to-site.
42 terms
VPNs and Tunneling
Tunneling
VPN
Multiplexing
Demultiplexing
The act of encapsulating a packet from one protocol into anot…
A networking infrastructure whereby a private network makes u…
The combining of multiple distinct entities into a larger con…
The extraction of distinct entities from a larger containing…
Tunneling
The act of encapsulating a packet from one protocol into anot…
VPN
A networking infrastructure whereby a private network makes u…
84 terms
IPSec VPNs
ESP
AH (Authentication Headers)
ESP IPSec Tunnel Mode (Site-to-Site)
ESP IPSec Transport Mode (Site-to-Site)
Layer 4 protocol. Provides confidentiality (encryption), inte…
Layer 4 protocol. Provides integrity, authentication, and pro…
Is the default mode... The entire IP packet (IP header and paylo…
Is not the default mode. Needs to be specified in the crypto…
ESP
Layer 4 protocol. Provides confidentiality (encryption), inte…
AH (Authentication Headers)
Layer 4 protocol. Provides integrity, authentication, and pro…
37 terms
Chapter 7 VPN Overview
Objectives
leased line
Layer 2
tunneling, encryption, tunneling
VPN Concepts ... key vpn technologies... typical vpn types and appl…
Traditional VPN networking mainly uses two modes: ____ VPN an…
A leased line VPN is a _____ VPN that is built through a digi…
common VPN tecjnologies... _____ ... key management... _____-... data aut…
Objectives
VPN Concepts ... key vpn technologies... typical vpn types and appl…
leased line
Traditional VPN networking mainly uses two modes: ____ VPN an…
70 terms
Chapter 3 VPN Fundamentals
Algorithm
Asymmetric cryptography
Authentication, authorization, and acc…
Authenticity
A set of rules and procedures, usually mathematical in nature…
A means of encoding and information using related but differe…
Programs used to control access to computer resources, enforc…
The security service of the combination of authentication and…
Algorithm
A set of rules and procedures, usually mathematical in nature…
Asymmetric cryptography
A means of encoding and information using related but differe…
11 terms
Chapter 7: VPN
What is a virtual private network?
What is a benefit of a VPN?
How are VPNs created? (what are needed?)
What are the advantages of VPNs?
A private network that uses a public network to connect users
Extend the reach of the organisation's networks
Log-ins, encryption
Allow remote uses to access company network, allow flexibilit…
What is a virtual private network?
A private network that uses a public network to connect users
What is a benefit of a VPN?
Extend the reach of the organisation's networks
13 terms
Dos,DDos,VPN,IDS
DoS
SYN Flood
Ping Flood
Smurf
attack is an attempt to defeat availability, the third of the…
attacker sends(TCP) successions of syn requests to target a s…
Node receiving a ping packet is expected to generate a... reply,…
Spoof (source) address of sender end node in ping packet by s…
DoS
attack is an attempt to defeat availability, the third of the…
SYN Flood
attacker sends(TCP) successions of syn requests to target a s…
50 terms
wallopez - CCNA SEC - VPN
is a symmetric encryption algorithm th…
is a symmetric, three-block cipher alg…
are an organized sequence of steps use…
refers to the software responsible for…
Triple DES (3DES)
Advanced Encryption Standard (AES)
algorithms
Adaptive Security Appliance (ASA)
is a symmetric encryption algorithm th…
Triple DES (3DES)
is a symmetric, three-block cipher alg…
Advanced Encryption Standard (AES)
10 terms
Chapter 11 - VPN Concept
Which of the following is NOT an essen…
Which of the following is a type of VP…
Which of the following is NOT true abo…
Which of the following is true about s…
Authentication server
Client-to-site
Have more security vulnerabilities than software VPNs
best when all router and firewall hardware is the same
Which of the following is NOT an essen…
Authentication server
Which of the following is a type of VP…
Client-to-site
24 terms
VPNs and VLANs
VPN
How does a remote client get a local I…
PPTP VPN
L2TP VPN
Virtual Private Network... Encrypted tunnels between a computer…
Connect to local LAN over internet and queries DHCP for IP ad…
Point to Point Tunnel Protocol... Creates a secure tunnel throu…
Layer 2 Tunneling Protocol... Uses IPsec... VPN capable routers c…
VPN
Virtual Private Network... Encrypted tunnels between a computer…
How does a remote client get a local I…
Connect to local LAN over internet and queries DHCP for IP ad…
36 terms
Different Types of Networks/VPN
A network is a group of __________comp…
LAN = +
WAN = +
A WAN is two or more ___________ netwo…
two or more
Local Area Network The computers are geographically close tog…
Wide-area network (WAN): The computers are farther apart and…
LAN's
A network is a group of __________comp…
two or more
LAN = +
Local Area Network The computers are geographically close tog…
67 terms
MPLS & VPNs
Inet.3
mpls.0
bgp.layer3vpn.0
An identifier attached to a route, des…
This routing table holds the RSVP and LDP routes, relevant fo…
Mpls switching table
This routing table stores all the vpnv4 unicast routes receiv…
What is a route destinguisher?
Inet.3
This routing table holds the RSVP and LDP routes, relevant fo…
mpls.0
Mpls switching table
11 terms
6.7 VPN's
Which IPsec subprotocol provides data…
PPTP is quickly becoming obsolete beca…
You have a group of salesmen who would…
Which VPN protocol typically employs I…
ESP
L2TP
VPN concentrator
L2TP
Which IPsec subprotocol provides data…
ESP
PPTP is quickly becoming obsolete beca…
L2TP
9 terms
Rob -VPNs
Benefits of VPNs
2 types of VPNs
What is GRE?
cmds to configure a GRE tunnel
Cheap vs WANs, Scalability, compatibility with broadband tech…
Site to Site and Remote Access... Site to Site is between 2 netw…
Generic routing encapsulation.... made by cisco... encapsulates all…
interface tunnel0... tunnel mode gre ip... ip address x.x.x.x... tunne…
Benefits of VPNs
Cheap vs WANs, Scalability, compatibility with broadband tech…
2 types of VPNs
Site to Site and Remote Access... Site to Site is between 2 netw…
9 terms
Quizlet sobre VPN
DMVPN
Túneles de concentrador a dispositivo…
Túneles de dispositivo radial a dispos…
Tecnologías de componentes de DMVPN
VPN multipunto dinámica. Una solución de software de Cisco pa…
los sitios radiales, como las sucursales, se conectan directa…
los sitios radiales se pueden conectar directamente a otros s…
"1. Protocolo de resolución de próximo salto (NHRP)... 2. Túnele…
DMVPN
VPN multipunto dinámica. Una solución de software de Cisco pa…
Túneles de concentrador a dispositivo…
los sitios radiales, como las sucursales, se conectan directa…
13 terms
Network Storage and VPN Protocols
A technology that transmits data of up…
An IP-based protocol used to communica…
What is one advantage of iSCSI over Fi…
What OSI layer does FCoE run at?
Fiber Channel
Internet Small Computer Systems Interface iSCSI
Special hardware is not needed to connect to the shared disk…
Layer 2
A technology that transmits data of up…
Fiber Channel
An IP-based protocol used to communica…
Internet Small Computer Systems Interface iSCSI
22 terms
VPN's Tunnels
what vpn is for a host back to the wor…
where would vpn passthrough be configu…
what vpn is for remote office to main…
does ppp have encryption
client to site
on a router
site to site
no
what vpn is for a host back to the wor…
client to site
where would vpn passthrough be configu…
on a router
9 terms
Mini-quiz sur le VPN
DMVPN
Tunnels Hub to Spoke DMVPN
Tunnels Spoke to Spoke DMVPN
Technologies du DMVPN
VPN multipoint dynamique solution logicielle Cisco permettant…
les sites spokes, tels que les filiales, se connectent direct…
les sites spokes peuvent se connecter directement à d'autres…
1. Protocole NHRP (Next Hop Resolution Protocol)... 2. Tunnels d…
DMVPN
VPN multipoint dynamique solution logicielle Cisco permettant…
Tunnels Hub to Spoke DMVPN
les sites spokes, tels que les filiales, se connectent direct…
16 terms
Clientless SSL VPN (Clientless Remote Access VPN)
Clientless SSL VPN General
Clientless SSL VPN: Connecting
Proxy
Clientless SSL VPN Accessible "Interna…
Uses just a browser which means it does not require an Admini…
You absolutely must use https to connect to the ASA's outside…
Protects internal devices because it does not give complete c…
Web-based applications (Not all applications are supported)... C…
Clientless SSL VPN General
Uses just a browser which means it does not require an Admini…
Clientless SSL VPN: Connecting
You absolutely must use https to connect to the ASA's outside…
84 terms
IPSec VPNs
ESP
AH (Authentication Headers)
ESP IPSec Tunnel Mode (Site-to-Site)
ESP IPSec Transport Mode (Site-to-Site)
Layer 4 protocol. Provides confidentiality (encryption), inte…
Layer 4 protocol. Provides integrity, authentication, and pro…
Is the default mode... The entire IP packet (IP header and paylo…
Is not the default mode. Needs to be specified in the crypto…
ESP
Layer 4 protocol. Provides confidentiality (encryption), inte…
AH (Authentication Headers)
Layer 4 protocol. Provides integrity, authentication, and pro…
23 terms
Chapter 8 IPSec VPN
IPSec, IKE
anti-replay, authenticity
gateways , between
security payload
Objectives:... ___ basics... AH ans ESP... Service flow of the protoco…
IPSec features: ... confidentiality... _____... ___... integrity
scenarios:... ____... host and gateways... ____ hosts
encapsulating ____ _______ ESP
IPSec, IKE
Objectives:... ___ basics... AH ans ESP... Service flow of the protoco…
anti-replay, authenticity
IPSec features: ... confidentiality... _____... ___... integrity
21 terms
VPN Client configuration
General
General
General
General
The General tab identifies the remote computer that the clien…
For a dial-up connection, specify the phone number of the rem…
For a VPN connection, specify the IP address or hostname of t…
For a VPN connection, you can configure the connection to use…
General
The General tab identifies the remote computer that the clien…
General
For a dial-up connection, specify the phone number of the rem…
22 terms
6.9 VPN
Virtual Private Network (VPN)
WAN connections... telephone line,... remote…
tunneling protocol
host-to-host VPN
remote access connection that uses encryption to securely sen…
What does VPN provide an alternative to ?
encrypts packet contents and encapsulates those packets
individual host connected to the Internet to establish a VPN…
Virtual Private Network (VPN)
remote access connection that uses encryption to securely sen…
WAN connections... telephone line,... remote…
What does VPN provide an alternative to ?
1 of 10