3.02. IPSec VPN Fundamentals

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/46

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

47 Terms

1
New cards

What is IPSec?

A suite of protocols that create secure, encrypted tunnels between networks across insecure networks such as the public internet.

2
New cards

What are common use cases for IPSec?

Site-to-site VPNs between geographically separated business locations or hybrid cloud connections like AWS to on-premises data centers.

3
New cards

What does IPSec provide?

Authentication of peers and encryption of traffic to ensure confidentiality and integrity.

4
New cards

What is "interesting traffic" in IPSec?

Traffic that matches configured rules (e.g. IP ranges or port-based rules) and triggers the creation of an IPSec VPN tunnel.

5
New cards

When does an IPSec tunnel get torn down?

When no interesting traffic is detected for a period of time.

6
New cards

Why is symmetric encryption used for data transfer in IPSec?

It is faster and more efficient than asymmetric encryption for large volumes of data.

7
New cards

Why is asymmetric encryption used in IPSec setup?

It allows secure key exchange without transmitting the symmetric key, thus enabling both sides to independently derive it.

8
New cards

What are the two main phases of an IPSec VPN?

IKE Phase 1 and IKE Phase 2.

9
New cards

What does IKE stand for?

Internet Key Exchange.

10
New cards

What is the purpose of IKE Phase 1?

To authenticate peers and establish a secure encrypted tunnel (Security Association) using asymmetric encryption and key exchange.

11
New cards

What are common authentication methods in IKE Phase 1?

Pre-shared keys or digital certificates.

12
New cards

What is a Security Association (SA)?

A logical construct in IPSec representing a one-way secure communication path. Two SAs are used for bidirectional communication.

13
New cards

What protocol handles the key exchange in IKE Phase 1?

Diffie-Hellman (DH) key exchange.

14
New cards

What is exchanged during the Diffie-Hellman process?

Public keys. Each side uses its private key and the other side’s public key to derive a shared secret key.

15
New cards

What is the outcome of IKE Phase 1?

A Phase 1 Security Association and a symmetric key used for Phase 2 negotiations.

16
New cards

What is the purpose of IKE Phase 2?

To negotiate encryption methods and establish the keys used to protect data traffic in the IPSec tunnel.

17
New cards

What is derived in IKE Phase 2?

A Phase 2 (IPSec) Security Association and a new symmetric encryption key for data transfer.

18
New cards

Is Phase 2 slower or faster than Phase 1?

Faster – Phase 1 does the heavy cryptographic lifting.

19
New cards

Can the Phase 1 tunnel persist even after Phase 2 is torn down?

Yes. Phase 1 can persist, enabling rapid re-establishment of Phase 2 as needed.

20
New cards

How many SAs are required for communication between two peers?

Two – one for each direction of traffic.

21
New cards

What are the two types of IPSec VPNs?

Policy-based VPNs and Route-based VPNs.

22
New cards

What is a Policy-based VPN?

A VPN where specific policies define which traffic is considered interesting and which SA to use. Each policy creates a distinct SA pair.

23
New cards

What is a Route-based VPN?

A VPN where routes (IP prefixes) define interesting traffic. One SA pair is used for all traffic between two networks.

24
New cards

Which VPN type allows for more granular traffic control?

Policy-based VPNs.

25
New cards

Which VPN type is easier to set up?

Route-based VPNs.

26
New cards

In a route-based VPN, how is traffic matched?

By destination prefix (e.g. 192.168.0.0/24).

27
New cards

In a policy-based VPN, how is traffic matched?

By detailed policies, possibly including port numbers, protocols, or specific subnets.

28
New cards

What does a Phase 2 tunnel rely on from Phase 1?

The symmetric key derived during Phase 1 and the security association established.

29
New cards

What is the benefit of the DH-derived key mechanism?

It allows secure key agreement without ever transmitting the actual symmetric key over the network.

30
New cards

Can multiple Phase 2 tunnels exist over a single Phase 1 tunnel?

Yes, especially with policy-based VPNs where each policy creates its own SA.

31
New cards

What protocol enables the mathematical basis for securely exchanging keys in IPSec?

Diffie-Hellman key exchange.

32
New cards

In IPSec terminology, what is a “tunnel”?

A secure logical path for encrypted traffic between two peers over an insecure network.

33
New cards

Why is IPSec considered secure even over the public internet?

Because it encrypts all payload traffic, uses authenticated peers, and resists tampering and eavesdropping.

34
New cards

Which AWS services make use of IPSec-based VPNs?

AWS Site-to-Site VPN, Transit Gateway VPNs, and sometimes custom VPNs built on EC2 instances.

35
New cards

How are cipher suites chosen in Phase 2?

One peer presents supported options, the other selects the strongest mutual suite, and this is used for encrypting IPSec traffic.

36
New cards

What does “SA pair” mean in the context of IPSec?

A bidirectional tunnel formed by two unidirectional Security Associations (one in each direction).

37
New cards

What happens if no interesting traffic is detected for a time?

The Phase 2 tunnel (IPSec SA) may be torn down.

38
New cards

Can IPSec support different encryption settings for different traffic types?

Yes, with policy-based VPNs.

39
New cards

Why is the Phase 1 and Phase 2 split considered elegant?

It separates heavy cryptographic operations (Phase 1) from efficient data tunneling (Phase 2), improving performance and reusability.

40
New cards

What is IPSEC?

knowt flashcard image
41
New cards

What does IPSEC architecture look like over public network? What is interesting traffic?

Traffic that match certain rules. If no interesting traffic, IPSEC tunnels are torn down.

<p>Traffic that match certain rules. If no interesting traffic, IPSEC tunnels are torn down. </p>
42
New cards

What is symmetric and asymmetric encryption in the context of IPSEC?

knowt flashcard image
43
New cards

What are the two phases of IPSEC?

knowt flashcard image
44
New cards

What does Phase 1 of IPSEC look like?

knowt flashcard image
45
New cards

What does Phase 2 of IPSEC look like?

knowt flashcard image
46
New cards

What are the two types of VPNs?

knowt flashcard image
47
New cards

What are the two types of VPNs architecturally?

knowt flashcard image