*1.4 Internet Protocols

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

ICMP

  • Sends messages between devices to try to get responses back to ensure it’s on/alive

    • Ex. the ping command uses this

    • Can give response or TTL expiration warnings

2
New cards

TCP

  • Connection-oriented

  • Reliable

  • Flow speed control

  • Can resend/reorder packets

3
New cards

UDP

  • Connectionless

  • Unreliable

  • No flow speed control

  • No error recovery/verification/resending of data

4
New cards

GRE

  • Creates a tunnel between two devices connected with a VPN

  • Encapsulates data in an IP packet and send it over a GRE tunnel

  • This doesn’t do the encryption

5
New cards

Concentrator

  • Purpose-built device or software (or built into firewall) for encrypting/decrypting VPN connections

  • Has cryptographic hardware

6
New cards

IPSec

  • Protocol that provides VPN encryption

  • Standardized; firewalls on either side of convo can communicate over the VPN tunnel

7
New cards

Authentication Header (AH)

  • An IPSec protocol

  • Validates info sent over an IPSEC tunnel

  • Everything is sent unencrypted, but with hashing for integrity

<ul><li><p>An IPSec protocol</p></li><li><p>Validates info sent over an IPSEC tunnel</p></li><li><p>Everything is sent unencrypted, but with hashing for integrity</p></li></ul><p></p>
8
New cards

Encapsulating Security Payload (ESP)

  • An IPSec protocol

  • Encrypts the original packet and the ESP trailer, and then we put a new IP header, an ESP header, and an integrity check value at the end of the packet

  • Encrypts and authenticates data

<ul><li><p>An IPSec protocol</p></li><li><p>Encrypts the original packet and the ESP trailer, and then we put a new IP header, an ESP header, and an integrity check value at the end of the packet</p></li><li><p>Encrypts and authenticates data</p></li></ul><p></p>
9
New cards

Internet Key Exchange (IKE)

  • Steps for both side of convo to agree on encryption/decryption keys

    • This agreement is the Security Association

  • Has 2 phases

10
New cards

IKE Phase 1 (ISAKMP)

  • Uses Diffie-Hellman to create shared secret key

    • UDP/500; ISAKMP protocol

<ul><li><p>Uses Diffie-Hellman to create shared secret key</p><ul><li><p>UDP/500; ISAKMP protocol</p></li></ul></li></ul><p></p>
11
New cards

IKE Phase 2

  • Coordinates ciphers and key sizes

<ul><li><p>Coordinates ciphers and key sizes</p></li></ul><p></p>
12
New cards

IPSec transport mode

  • IPSec header/trailer surround the data portion; only the data is encrypted

  • IP Header is in the clear; can see destination of the packet if captured

    • Less secure

<ul><li><p>IPSec header/trailer surround the data portion; only the data is encrypted</p></li><li><p>IP Header is in the clear; can see destination of the packet if captured</p><ul><li><p><strong>Less secure</strong></p></li></ul></li></ul><p></p>
13
New cards

IPSec tunnel mode

  • IPSec header and trailer put around both the original data and the original IP header; encrypts everything

  • Much more secure; used more often

    • Nothing from the original packet is sent in the clear; even if captured, you’d never see the destination/data

<ul><li><p>IPSec header and trailer put around both the original data and the original IP header; encrypts everything</p></li><li><p>Much <strong>more secure</strong>; used more often</p><ul><li><p>Nothing from the original packet is sent in the clear; even if captured, you’d never see the destination/data</p></li></ul></li></ul><p></p>