1

IPsec consists of what elements?

Answer:

Cryptographic algorithms, security protocols, security associations, IPsec databases, and SA and key management techniques.

2

What services does IPsec provide to IP?

Answer:

IPsec provides access control, connectionless integrity, data origin authentication, replay protection, data confidentiality, and limited traffic flow confidentiality.

3

What are the main characteristics of symmetric encryption algorithms?

Answer:

The same key is required for encryption and decryption; the ciphertext is compact; symmetric encryption algorithms are fast and can be used for bulk encryption.

4

What are the two types of symmetric encryption algorithms?

Answer:

Block ciphers and stream ciphers.

5

What are the characteristics of public key algorithms?

Answer:

They are much slower than symmetric algorithms and are not suitable for bulk encryption; ciphertext produced by public key algorithms is not compact; public key algorithms do not have the same key distribution and management problems as symmetric algorithms; public key algorithms can be used for encryption, for digital signatures, and for symmetric key exchange.

6

What security services do AH and ESP provide?

Answer:

AH provides connectionless integrity, data origin authentication, and optional replay protection. ESP provides connectionless integrity, data origin authentication, optional replay protection, data confidentiality, and limited traffic flow confidentiality.

7

What is an IPsec SA?

Answer:

An IPsec SA defines how traffic for a particular traffic flow is protected by IPsec.

8

What is the function of IKE?

Answer:

IKE allows IPsec peers to authenticate each other, generate keying material, and negotiate IPsec SAs.

9

What are some common considerations when selecting parameters for IPsec transform sets?

Answer:

The type of user traffic to be protected; the specific type of protection; the length of time that user traffic must stay confidential; the volume of traffic that is to be encrypted; the type of VPN gateway hardware platforms; whether hardware crypto accelerators will be used; the version of Cisco IOS Software that IPsec VPN gateways will be running.

Категории