Information Technology /Security+ (SY0-701): Lesson 5: Secure Enterprise Part 4

Security+ (SY0-701): Lesson 5: Secure Enterprise Part 4

Information Technology36 CardsCreated about 2 months ago

This deck covers key concepts from the Security+ (SY0-701) lesson on secure enterprise networks, focusing on VPNs, IPsec, and remote management.

Define a 'virtual private network (VPN)'

A secure tunnel created between two endpoints connected via an unsecure transport network.
Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/36

Key Terms

Term
Definition
Define a 'virtual private network (VPN)'
A secure tunnel created between two endpoints connected via an unsecure transport network.
Define a 'Secure Tunnel'
Mechanism encapsulating data from one protocol for safe transfer over another network such as the Internet.
What is the least secure VPN protocol/solution?
Point-to-Point Tunneling Protocol (PPTP).
Define a 'transport layer security (TLS) VPN'
Client connects to the remote access server using digital certificates.
Describe TLS' function when configured with a VPN
TLS creates an encrypted tunnel for the user to submit authentication credentials.
What layer(s) of the OSI model does TLS function?
Layer 4 & Layer 7; Transport layer and Application layer.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
Define a 'virtual private network (VPN)'
A secure tunnel created between two endpoints connected via an unsecure transport network.
Define a 'Secure Tunnel'
Mechanism encapsulating data from one protocol for safe transfer over another network such as the Internet.
What is the least secure VPN protocol/solution?
Point-to-Point Tunneling Protocol (PPTP).
Define a 'transport layer security (TLS) VPN'
Client connects to the remote access server using digital certificates.
Describe TLS' function when configured with a VPN
TLS creates an encrypted tunnel for the user to submit authentication credentials.
What layer(s) of the OSI model does TLS function?
Layer 4 & Layer 7; Transport layer and Application layer.
Define 'Internet Protocol Security (IPsec)'
Layer 3 protocol suite used to secure data through authentication and encryption as the data travels across a network.

What are the two core Internet Protocol Security (IPsec) protocols?

  1. Authentication Header (AH)

  2. Encapsulating Security Payload (ESP)

Define the purpose of the IPsec 'Authentication Header (AH)' protocol
Authenticates the sender of transmitted data; Provides integrity and protection against replay attacks.
How does the IPSec Authentication Header (AH) protocol function?
Calculates a cryptographic hash of the whole packet, plus a shared secret key, and adds this value in the header as an Integrity Check Value (ICV).
Define 'Encapsulating Security Payload (ESP)' IPsec protocol
Encrypts the header and payload of a data packet as well as authenticating the sender.

What two modes can IPsec be used in?

  1. Transport mode

  2. Tunnel mode

Define IPsec transport mode
Used to secure communications between hosts on a private network.
What is the outcome of configuring IPsec Encapsulating Security Payload (ESP) in transport mode?
The IP header for each packet is not encrypted, just the payload data.
What is the outcome of configuring IPsec Authentication Header (AH) in transport mode?
Provides integrity for the IP header.
Define IPsec 'Tunnel mode'
Used for site to site VPN connections.
What is the outcome of configuring IPsec Encapsulating Security Payload (ESP) in tunnel mode?
The whole IP packet (header and payload) is encrypted and encapsulated as a datagram with a new IP header.
What is the outcome of configuring IPsec Authentication Header (AH) in tunnel mode?
AH has no use case in tunnel mode, as confidentiality is usually required.
What is required for a host/router to use IPsec?
Must be assigned an IPsec policy to set the authentication mechanism, IPsec protocol (AH/ESP), and the mode (Transport/Tunnel).
What type of encryption key does IPsec's encryption and hashing depend on?
A shared secret.
Define the 'Internet Key Exchange (IKE) protocol'
Framework for creating a security association (SA) between hosts using IPSec.
Define the function of a 'security association (SA)'
Authenticates peers in an association; Selects cryptographic ciphers mutually supported by peers, and performs key exchange between peers.
What is the purpose of a 'security association (SA)'
Establishes that two hosts trust one another (authenticate) and agree on secure protocols and cipher suites to use to exchange data.
Define the first phase of Internet Key Exchange (IKE) protocol negotiations between two hosts
Authenticates the two peers and performs key agreement using the Diffie-Hellman algorithm to create a secure channel.

What two methods of authenticating hosts in the first phase of an Internet Key Exchange (IKE) protocol negotiation?

  1. Digital Certificates

  2. Pre-shared key (group authentication)

Define the second phase of Internet Key Exchange (IKE) protocol negotiations between two hosts
Peers in the Security Association (SA) establish ciphers and key sizes and IPSec protocol (AH and/or ESP) to be used in the IPSec session.
How many versions of IKE are there?
Two versions
Define the first version of Internet Key Exchange (IKE) protocol
Designed for site-to-site and host-to-host topologies and requires a supporting protocol to implement remote access VPNs.
Define the second version of Internet Key Exchange (IKE) protocol
For use as a stand-alone remote access client-to-site VPN solution.
What are improvements to IKEv2 in comparison IKEv1
Supports EAP, allows NAT transversal to configure a tunnel allowed by a home router/firewall.
Define HTML5 VPN
Using features of HTML5 to implement remote desktop/VPN connections via browser software (clientless).
Define 'in-band' remote management
Remote management link shares traffic with other communications on the production network.
Define 'out-of-band' remote management
The management interface of a network appliance is accessed using a separate network from the usual data network.
What are examples of in-band remote management protocols?
RDP, SSH, TLS/IPSec
What are examples of out-of-band remote management?
A serial console or modem port on a router.
Define a 'Jump server'
A hardened server that provides access to other hosts.