
Cisco Secure VPN Exam Certification Guide - Cisco press
.pdf

A P P E N D I X A
Answers to the “Do I Know This Already?” Quizzes and Q&A Sections
Chapter 2—Do I Know This Already?
1Which Cisco hardware product families support IPSec VPN technology?
Cisco IOS routers, PIX Firewalls, and VPN 3000 Series Concentrators, including the VPN 3002 Hardware Client, support IPSec VPN technology.
2What are the two IPSec protocols?
The two IPSec protocols are Authentication Header (AH) and Encapsulating Security Payload (ESP).
3Which type of VPNs use a combination of the same infrastructures that are used by the other two types of VPNs?
Business-to-business, or extranet, VPNs use a combination of the same infrastructures that are used by remote access and intranet VPNs.
4Which of the Cisco VPN 3000 Series Concentrators is a fixed-configuration device?
The Cisco VPN 3005 Concentrator is a fixed-configuration system that supports up to 100 simultaneous sessions.
5What key element is contained in the AH or ESP packet header?
The key element contained in each protocol’s header is the Security Parameters Index (SPI), giving the destination peer the information that it needs to authenticate and decrypt the packet.
6What are the two modes of operation for AH and ESP?
AH and ESP use Transport and Tunnel modes. In Transport mode, the original IP packet header is left intact and is not protected by IPSec. In Tunnel mode, the original IP packet header is copied and the entire original IP packet is then protected by AH or ESP.


Chapter 2— Q&A 491
14What is the difference between the deny keyword in a crypto Access Control List (ACL) and the deny keyword in an access ACL?
In an access ACL, the deny keyword tells the network device to drop the packet. In a crypto ACL, the deny keyword tells the network device to pass the traffic in the clear without the benefit of IPSec security.
15What transform set would allow SHA-1 authentication of both AH and ESP packets and would also provide Triple Data Encryption Standard (3DES) encryption for ESP?
The transform set that would allow 3DES for ESP and SHA-1 for both is ah-sha- hmac esp-3des esp-sha-hmac.
16What are the five steps of the IPSec process?
The five steps of the IPSec process are as follows:
a.Interesting traffic triggers IPSec process.
b.Authenticate peers and establish IKE SAs (IKE Phase 1).
c.Establish IPSec SAs (IKE Phase 2).
d.Allow secured communications.
e.Terminate VPN.
Chapter 2—Q&A
1What are the Cisco hardware product families that support IPSec VPN technology?
Cisco IOS Software routers, PIX Firewalls, and VPN 3000 Series Concentrators, including the VPN 3002 Hardware Client, support IPSec VPN technology.
2What are the two IPSec protocols?
The two IPSec protocols are Authentication Header (AH) and Encapsulating Security Payload (ESP).
3What are the three major VPN categories?
The three major VPN categories are remote access, intranet (site-to-site), and extranet (business-to-business).
4What is an SEP module used for?
Scalable Encryption Processing (SEP) modules are used with Cisco VPN 3030, 3060, and 3080 Concentrators to provide hardware-based encryption services.


Chapter 2— Q&A 493
14Which Cisco PIX Firewall models offer a failover port for high availability and support VACs?
The three high-end models of the PIX Firewall have a failover port and support VPN Accelerator Cards (VACs). Those models are the Cisco PIX 515E Firewall, the Cisco PIX 525 Firewall, and the Cisco PIX 535 Firewall.
15Which series of Cisco hardware devices are purpose-built remote access VPN devices?
The Cisco VPN 3000 Series Concentrators were designed specifically to support remote access VPN services.
16Which of the Cisco VPN 3000 Series Concentrators is a fixed-configuration device?
The Cisco VPN 3005 Concentrator is a fixed-configuration system that supports up to 100 simultaneous sessions.
17Which of the Cisco VPN 3000 Series Concentrators can accept SEP modules?
The three high-end concentrators support SEP modules. These systems are the Cisco VPN 3030 Concentrator, the 3060 Concentrator, and the 3080 Concentrator.
18What feature of the Cisco Unity Client makes it scalable?
The client version updates can be pushed to the user’s system from a central network site when the user makes the initial login attempt. This scalability feature relieves the burden of having to configure numerous client systems and enables a managed growth path for VPN deployment.
19Which of Cisco’s VPN clients can be used with any operating system that communicates in IP?
The Cisco VPN 3002 Hardware Client enables any user device that communicates in IP to access an IPSec tunnel. Operating systems such as Windows, Solaris, MAC, and Linux can all participate in IPSec secure communications using these devices.
20What protocol enables IP-enabled wireless devices such as PDAs and Smart Phones to participate in VPN communications?
The Elliptic Curve Cryptosystem (ECC) Protocol permits IP-enabled wireless devices to participate in VPN communications. All Cisco VPN 3000 Series Concentrators support ECC, which is a new Diffie-Hellman group that allows faster processing of keying information.
21What are the three phases of Cisco Mobile Office?
The three phases of Cisco Mobile Office are On The Road, At Home, and At Work.
22What is the distinctive characteristic of Cisco VPN Device Manager?
Cisco VPN Device Manager is an embedded device manager that is installed directly into a supporting router’s flash memory.


Chapter 2— Q&A 495
30What methods does IPSec use for key management?
IPSec uses Certificate Authorities (CAs) and the Diffie-Hellman key exchange process for key management.
31What is the key element contained in the AH or ESP packet header?
The key element contained in each protocol’s header is the SPI, giving the destination peer the information it needs to authenticate and decrypt the packet.
32Which IPSec protocol does not provide encryption services?
Authentication Header (AH) does not provide encryption services. AH packets are sent as clear text.
33What is the triplet of information that uniquely identifies a Security Association?
The combination of the destination IP address, the IPSec protocol, and the Security Parameters Index (SPI) uniquely identifies a Security Association (SA).
34What is an ICV?
An Integrity Check Value (ICV) is a calculated representation of the immutable contents of an IPSec packet. Each peer calculates this value for the packet independently. If the values do not match, the packet is considered as having been altered in transit and the packet is discarded.
35What IPSec protocol must you use when confidentiality is required in your IPSec communications?
You must use ESP when confidentiality is required in your IPSec communications. ESP provides encryption; AH does not.
36What is the primary difference between the mechanisms used by AH and ESP to modify an IP packet for IPSec use?
AH inserts an IPSec header into the packet containing the SPI and other related information. ESP encapsulates the original IP packet or the data portion of that packet by surrounding it with both a header and a trailer.
37What are the two modes of operation for AH and ESP?
AH and ESP use Transport and Tunnel modes. In Transport mode, the original IP packet header is left intact and is not protected by IPSec. In Tunnel mode, the original IP packet header is copied and the entire original IP packet is then protected by AH or ESP.
38Which IPSec protocol should you use if your system is using NAT?
AH does not support Network Address Translation (NAT) because changing the source IP address in the IP header causes authentication to fail.


Chapter 2— Q&A 497
46How are preshared keys exchanged?
Preshared keys are exchanged manually, severely impacting the scalability of their use.
47What does the Diffie-Hellman key agreement protocol permit?
The Diffie-Hellman (D-H) key agreement protocol allows two peers to exchange a secret key without having any prior secrets. This protocol is an example of an
asymmetrical key exchange process in which peers exchange different public keys to generate identical private keys.
48Why is D-H not used for symmetric key encryption processes?
Asymmetric key encryption processes like Diffie-Hellman are much too slow for the bulk encryption required in high-speed VPN circuits.
49What is a CRL?
A Certificate Revocation List (CRL) is a list of expired or voided digital certificates that a CA makes available to its customers. Clients use these CRLs during the process of authenticating a peer.
50What are the five parameters required by IKE Phase 1?
IKE Phase 1 needs to know the following parameters:
a.Encryption algorithm
b.Hashing algorithm
c.Authentication method
d.Key exchange method
e.IKE SA lifetime
51What are the valid AH authentication transforms?
There are only three valid AH authentication transforms: ah-md5-hmac, ah-sha-hmac, and ah-rfc1828.
52What transform set would allow for SHA-1 authentication of both AH and ESP packets and would also provide 3DES encryption for ESP?
The transform set that would allow for 3DES for ESP and SHA-1 for both is ah-sha-hmac esp-3des esp-sha-hmac.