CCNA4E_CH6_STUDY_GUIDE_KEY

advertisement
CCNA EXPLORATION
ACCESSING THE WAN
Study Guide
Chapter 6: Teleworker Services
6.0.1 What is meant by Teleworking?
It is a broad term referring to conducting work by connecting
to a workplace from a remote location, with the assistance of
telecommunications.
How is efficient Teleworking made possible?
Because of broadband Internet connections, virtual private
networks (VPN), and more advanced technologies, including
Voice over IP (VoIP) and videoconferencing.
6.1.1 What are the organizational, social, &
Organizational benefits:
environmental benefits of Teleworking?
Continuity of operations
Increased responsiveness
Secure, reliable, and manageable access to
information
Cost-effective integration of data, voice, video, and
applications
Increased employee productivity, satisfaction, and
retention
Social benefits:
Increased employment opportunities for marginalized
groups
Less travel and commuter related stress
Environmental benefits:
Reduced carbon footprints, both for individual
workers and organizations
6.1.2 What are three remote connection
Traditional private WAN Layer 2 technologies, including
technologies available to organizations for
Frame Relay, ATM, and leased lines, provide many remote
supporting teleworker services?
connection solutions. The security of these connections
depends on the service provider.
IPsec Virtual Private Networks (VPNs) offer flexible and
scalable connectivity.
Site-to-site connections can provide a secure, fast, and
reliable remote connection to teleworkers. This is the most
common option for teleworkers, combined with remote
access over broadband, to establish a secure VPN over the
public Internet. (A less reliable means of connectivity using
the Internet is a dialup connection.)
What does the term broadband refer to?
To advanced communications systems capable of providing
high-speed transmission of services, such as data, voice, and
video, over the Internet and other networks.
What components are needed for
 Home Office Components - The required home office
telecommuting?
components are a laptop or desktop computer,
CCNA EXP 4
CH.6 Teleworker Services
APRIL 2009
What is Quality of Service (QoS)?
6.2.1 What are the main connection methods used
by home and small business users Teleworkers
to connect to an ISP to access the Internet?
6.2.2 Describe accessing the Internet through a cable
network by teleworkers.
What is a drop cable?
What are some of the advanced
telecommunications services offered by Cable
operators?
How do they deploy these services?
broadband access (cable or DSL), and a VPN router or
VPN client software installed on the computer.
Additional components might include a wireless
access point. When traveling, teleworkers need an
Internet connection and a VPN client to connect to
the corporate network over any available dialup,
network, or broadband connection.
 Corporate Components - Corporate components are
VPN-capable routers, VPN concentrators,
multifunction security appliances, authentication, and
central management devices for resilient aggregation
and termination of the VPN connections
QoS refers to the capability of a network to provide better
service to selected network traffic, as required by voice and
video applications.
Dialup access - An inexpensive option that uses any phone
line and a modem. To connect to the ISP, a user calls the ISP
access phone number. Dialup is the slowest connection
option, and is typically used by mobile workers in areas where
higher speed connection options are not available.
DSL - Typically more expensive than dialup, but provides a
faster connection. DSL also uses telephone lines, but unlike
dialup access, DSL provides a continuous connection to the
Internet. DSL uses a special high-speed modem that separates
the DSL signal from the telephone signal and provides an
Ethernet connection to a host computer or LAN.
Cable modem - Offered by cable television service providers.
The Internet signal is carried on the same coaxial cable that
delivers cable television. A special cable modem separates the
Internet signal from the other signals carried on the cable and
provides an Ethernet connection to a host computer or LAN.
Satellite - Offered by satellite service providers. The computer
connects through Ethernet to a satellite modem that
transmits radio signals to the nearest point of presence (POP)
within the satellite network.
The cable system uses a coaxial cable that carries radio
frequency (RF) signals across the network.
Generally, a cable that connects a network device to a
physical medium. A type of AUI.
High-speed Internet access, digital cable television, and
residential telephone service.
Cable operators typically deploy hybrid fiber-coaxial (HFC)
networks to enable high-speed transmission of data to cable
modems located in a SOHO.
What are some of the major components of a
Antenna site, transportation system, headend, trunk cable,
cable system?
amplifier, distribution cable/feeder, subscriber drop cable
What is frequency?
The rate at which current (or voltage) cycles occur, computed
as the number of "waves" per second.
What is wavelength?
The speed of propagation of the electromagnetic signal
divided by its frequency in cycles per second.
What portion of the electromagnetic spectrum Between approximately 1 kilohertz (kHz) through 1 terahertz.
CCNA EXP 4
CH.6 Teleworker Services
APRIL 2009
do radio waves, generally called RF, constitute?
Describe frequency scope used by a cable
network.
What is DOCSIS?
How do cable operators employ DOCSIS?
Describe how DOCSIS specifies the OSI Layer 1
and Layer 2 requirements?
What is CDMA?
What is S-CDMA?
Recap the features of DOCSIS.
What are the two types of equipment are
required to send digital modem signals
upstream and downstream on a cable system?
What is a CMTS?
CCNA EXP 4
Downstream - The direction of an RF signal transmission (TV
channels and data) from the source (headend) to the
destination (subscribers). Transmission from source to
destination is called the forward path. Downstream
frequencies are in the range of 50 to 860 megahertz (MHz).
Upstream - The direction of the RF signal transmission from
subscribers to the headend or the return or reverse path.
Upstream frequencies are in the range of 5 to 42 MHz.
The Data-over-Cable Service Interface Specification (DOCSIS)
is an international standard developed by CableLabs, a nonprofit research and development consortium for cable-related
technologies.
DOCSIS defines the communications and operation support
interface requirements for a data-over-cable system, and
permits the addition of high-speed data transfer to an existing
CATV system.
To provide Internet access over their existing hybrid fibercoaxial (HFC) infrastructure.
Physical layer - For data signals that the cable operator can
use, DOCSIS specifies the channel widths (bandwidths of each
channel) as 200 kHz, 400 kHz, 800 kHz, 1.6 MHz, 3.2 MHz, and
6.4 MHz. DOCSIS also specifies modulation techniques (the
way to use the RF signal to convey digital data).
MAC layer - Defines a deterministic access method, timedivision multiple access (TDMA) or synchronous code division
multiple access method (S-CDMA).
Code division multiple access (CDMA) employs spreadspectrum technology and a special coding scheme in which
each transmitter is assigned a specific code.
a proprietary version of CDMA developed by Terayon
Corporation for data transmission across coaxial cable
networks. S-CDMA scatters digital data up and down a wide
frequency band and allows multiple subscribers connected to
the network to transmit and receive concurrently. S-CDMA is
secure and extremely resistant to noise.
 DOCSIS is a standard for certification of cable
equipment vendor devices (cable modem and cable
modem termination system).
 DOCSIS specifies the physical and MAC layers.
 DOCSIS defines RF interface requirements for a dataover-cable system.
 Cable equipment vendors must pass certification
conducted by CableLabs.
 Euro-DOCSIS is a variation adapted for use in Europe.
Cable modem termination system (CMTS) at the headend of
the cable operator
Cable modem (CM) on the subscriber end
A component that exchanges digital signals with cable
modems on a cable network. A headend CMTS communicates
with CMs that are located in subscriber homes. The headend
CH.6 Teleworker Services
APRIL 2009
What is a CM?
Describe how data is sent over cable.
Discuss access speed on a modern HFC
network.
How do cable operators handle congestion?
6.2.3 What is DSL?
What are the two basic types of DSL
technologies?
Describe how DSL is deployed.
The two key components are the DSL
transceiver and the DSLAM. Describe them.
CCNA EXP 4
is actually a router with databases for providing Internet
services to cable subscribers.
A cable modem that enables you to receive data at high
speeds. Typically it attaches to a standard 10BASE-T Ethernet
card in the computer.
A headend CMTS communicates with CMs located in
subscriber homes. The architecture is relatively simple, using a
mixed optical-coaxial network in which optical fiber replaces
the lower bandwidth coaxial.
A web of fiber trunk cables connects the headend to the
nodes where optical-to-RF signal conversion takes place. The
fiber carries the same broadband content for Internet
connections, telephone service, and streaming video as the
coaxial cable carries. Coaxial feeder cables originate from the
node that carries RF signals to the subscribers.
Typically 500 to 2,000 active data subscribers are connected
to a cable network segment, all sharing the upstream and
downstream bandwidth. The actual bandwidth for Internet
service over a CATV line can be up to 27 Mb/s on the
download path to the subscriber and about 2.5 Mb/s of
bandwidth on the upload path. Based on the cable network
architecture, cable operator provisioning practices, and traffic
load, an individual subscriber can typically get an access speed
of between 256 kb/s and 6 Mb/s.
They can add additional bandwidth for data services by
allocating an additional TV channel for high-speed data.
They can reduce the number of subscribers served by each
network segment. To reduce the number of subscribers, the
cable operator further subdivides the network by laying the
fiber-optic connections closer and deeper into the
neighborhoods.
Digital Subscriber Line: a means of providing high-speed
connections over installed copper wires.
Asymmetric (ADSL) and Symmetric (SDSL).
ADSL provides higher downstream bandwidth to the user than
upload bandwidth. SDSL provides the same capacity in both
directions.
Service providers deploy DSL connections in the last step of a
local telephone network, called the local loop or last mile. The
connection is set up between a pair of modems on either end
of a copper wire that extends between the customer premises
equipment (CPE) and the DSL access multiplexer (DSLAM). A
DSLAM is the device located at the central office (CO) of the
provider and concentrates connections from multiple DSL
subscribers.
Transceiver - Connects the computer of the teleworker to the
DSL. Usually the transceiver is a DSL modem connected to the
computer using a USB or Ethernet cable. Newer DSL
transceivers can be built into small routers with multiple
10/100 switch ports suitable for home office use.
DSLAM - Located at the CO of the carrier, the DSLAM
combines individual DSL connections from users into one
CH.6 Teleworker Services
APRIL 2009
What is the major advantage DSL has over
cable?
What is the major advantage of ADSL?
How is this deployed?
What are the two ways to separate ADSL from
voice at the customer premises?
Describe a microfilter.
high-capacity link to an ISP, and thereby, to the Internet.
DSL is not a shared medium. Each user has a separate direct
connection to the DSLAM. Adding users does not impede
performance, unless the DSLAM Internet connection to the
ISP, or the Internet, becomes saturated.
The ability to provide data services along with POTS voice
services.
When the service provider puts analog voice and ADSL on the
same wire, the provider splits the POTS channel from the
ADSL modem using filters or splitters. This setup guarantees
uninterrupted regular phone service even if ADSL fails. When
filters or splitters are in place, the user can use the phone line
and the ADSL connection simultaneously without adverse
effects on either service.
Using a microfilter or using a splitter.
A microfilter is a passive low-pass filter with two ends. One
end connects to the telephone, and the other end connects to
the telephone wall jack. This solution eliminates the need for
a technician to visit the premises and allows the user to use
any jack in the house for voice or ADSL service.
Describe a splitter.
POTS splitters separate the DSL traffic from the POTS traffic.
The POTS splitter is a passive device. In the event of a power
failure, the voice traffic still travels to the voice switch in the
CO of the carrier. Splitters are located at the CO and, in some
deployments, at the customer premises. At the CO, the POTS
splitter separates the voice traffic, destined for POTS
connections, and the data traffic destined for the DSLAM.
Describe a NID.
Network Interface Device—the actual device where the local
loop terminates on the customer premises at the demarcation
point.
What is the advantage(s) of using a microfilter
Splitters incur additional labor and technical support, so most
vs. a splitter?
home installations today use microfilters. Using microfilters
also has the advantage of providing wider connectivity
through the residence. Since the POTS splitter separates the
ADSL and voice signals at the NID, there is usually only one
ADSL outlet available in the house.
6.2.4 Describe 802.11 networking standards.
Data travels from place to place on radio waves. What makes
802.11 networking relatively easy to deploy is that it uses the
unlicensed radio spectrum to send and receive data. Most
radio and TV transmissions are government regulated and
require a license to use.
What are the benefits of Wi-Fi?
not having to use or install wired network connections
mobility
increased flexibility
productivity to the teleworker
What is a hotspot?
The area covered by one or more interconnected access
points. By overlapping access points, hotspots can cover many
square miles.
What are some of the types of Broadband
Municipal Wi-Fi
Wireless Access?
WiMAX
Satellite Internet
CCNA EXP 4
CH.6 Teleworker Services
APRIL 2009
Describe a typical home deployment.
Describe a wireless network uses a mesh
topology.
What is the advantage of mesh vs. single router
deployment?
Describe WiMAX.
What are the two main components if a WiMAX
network?
How does the tower connect to the Internet?
Where are satellite internet services used?
Describe the three ways to connect to the
Internet using satellites.
In two-way connections what is the most
important factor?
Describe IP multicasting technology as used by
two-way satellite Internet
CCNA EXP 4
A typical home deployment uses a single wireless router. This
deployment uses the hub-and-spoke model. If the single
wireless router fails, all connectivity is lost.
A mesh is a series of access points (radio transmitters) as
shown in the figure. Each access point is in range and can
communicate with at least two other access points. The mesh
blankets its area with radio signals. Signals travel from access
point to access point through this cloud.
Mesh installation is easier and can be less expensive because
there are fewer wires. Deployment over a large urban area is
faster. From an operational point of view, it is more reliable. If
a node fails, others in the mesh compensate for it.
WiMAX (Worldwide Interoperability for Microwave Access) is
telecommunications technology aimed at providing wireless
data over long distances in a variety of ways, from point-topoint links to full mobile cellular type access. WiMAX operates
at higher speeds, over greater distances, and for a greater
number of users than Wi-Fi.
A tower that is similar in concept to a cellular telephone
tower. A single WiMAX tower can provide coverage to an area
as large as 3,000 square miles, or almost 7,500 square
kilometers.
A WiMAX receiver that is similar in size and shape to a
PCMCIA card, or built into a laptop or other wireless device.
A WiMAX tower station connects directly to the Internet using
a high-bandwidth connection (for example, a T3 line). A tower
can also connect to other WiMAX towers using line-of-sight
microwave links.
in locations where land-based Internet access is not available,
or for temporary installations that are continually on the
move. Internet access using satellites is available worldwide,
including for vessels at sea, airplanes in flight, and vehicles
moving on land.
One-way multicast satellite Internet systems are used for IP
multicast-based data, audio, and video distribution. Even
though most IP protocols require two-way communication, for
Internet content, including web pages, one-way satellitebased Internet services can be "pushed" pages to local storage
at end-user sites by satellite Internet. Full interactivity is not
possible.
One-way terrestrial return satellite Internet systems use
traditional dialup access to send outbound data through a
modem and receive downloads from the satellite.
Two-way satellite Internet sends data from remote sites via
satellite to a hub, which then sends the data to the Internet.
The satellite dish at each location needs precise positioning to
avoid interference with other satellites.
The antenna has to have a clear view toward the equator,
where most orbiting satellites are stationed. Trees and heavy
rains can affect reception of the signals.
IP multicasting technology allows one satellite to serve up to
5,000 communication channels simultaneously. IP multicast
CH.6 Teleworker Services
APRIL 2009
Wireless networking complies with a range of
standards that routers and receivers use to
communicate with each other. What are the
most common standard?
Why are the terms 802.11 and Wi-Fi not really
interchangeable?
What is the Wi-Fi Alliance?
sends data from one point to many points at the same time by
sending data in a compressed format. Compression reduces
the size of the data and the bandwidth.
The IEEE 802.11 wireless local area network (WLAN) standard,
which addresses the 5 GHz and 2.4 GHz public (unlicensed)
spectrum bands.
Wi-Fi is an industry-driven interoperability certification based
on a subset of 802.11.
Organization that offers certification for interoperability
between vendors of 802.11 products. It helps to market
WLAN technology interoperability between vendors.
Certification includes all three 802.11 RF technologies and
WPA.
Describe the most popular access approaches
IEEE 802.11b – IEEE WLAN standard for 11 Mbps at 2.4 GHz
to connectivity used by teleworkers.
IEEE 802.11g – IEEE WLAN standard for 54 Mbps at 2.4 GHz
Describe 802.11n.
The latest standard is a proposed amendment that builds on
the previous 802.11 standards by adding multiple-input
multiple-output (MIMO).
Describe 802.16 (or WiMAX).
This standard allows transmissions up to 70 Mb/s, and has a
range of up to 30 miles (50 km). It can operate in licensed or
unlicensed bands of the spectrum from 2 to 6 GHz.
6.3.1 Describe VPNs.
Virtual Private Networks - enables organizations to create
private networks over the public Internet infrastructure that
maintain confidentiality and security.
Describe their basic deployment.
Organizations use VPNs to provide a virtual WAN
infrastructure that connects branch offices, home offices,
business partner sites, and remote telecommuters to all or
portions of their corporate network. To remain private, the
traffic is encrypted. Instead of using a dedicated Layer 2
connection, such as a leased line, a VPN uses virtual
connections that are routed through the Internet.
What are some of the benefits of VPNs?
Fast
Mobile
Secure
Dependable
Scalable
Little additional cost after initial setup
How can they be both virtual & private?
Virtual: Information within a private network is transported
over a public network.
Private: The traffic is encrypted to keeo the data confidential.
6.3.2 What are the types of VPNs?
Site-to-site & remote access
Describe site-to-site VPNs.
Site-to-site VPNs connect entire networks to each other.
In a site-to-site VPN, hosts send and receive TCP/IP traffic
through a VPN gateway, which could be a router, PIX firewall
appliance, or an Adaptive Security Appliance (ASA). The VPN
gateway is responsible for encapsulating and encrypting
outbound traffic for all of the traffic from a particular site and
sending it through a VPN tunnel over the Internet to a peer
VPN gateway at the target site. On receipt, the peer VPN
gateway strips the headers, decrypts the content, and relays
the packet toward the target host inside its private network.
CCNA EXP 4
CH.6 Teleworker Services
APRIL 2009
When are remote access VPNs used?
Describe remote access VPNs.
Remote access VPNs can be terminated at the
central site using the same type of equipment
as site-to-site VPNs with the addition of what
other equipment?
6.3.3 How do VPNs ensure confidentiality and
security?
By mobile users and telecommuters. Most teleworkers now
have access to the Internet from their homes and can
establish remote VPNs using broadband connections.
Similarly, a mobile worker can make a local call to a local ISP
to access the corporation through the Internet.
In a remote-access VPN, each host typically has VPN client
software. Whenever the host tries to send any traffic, the VPN
client software encapsulates and encrypts that traffic before
sending it over the Internet to the VPN gateway at the edge of
the target network. On receipt, the VPN gateway handles the
data in the same way as it would handle data from a site-tosite VPN.
You can use an VPN concentrator to terminate a VPN.
VPNs use cryptographic tunneling protocols to provide
protection against packet sniffing, sender authentication, and
message integrity.
What are the components required to establish
 An existing network with servers and workstations
a VPN?
 A connection to the Internet
 VPN gateways, such as routers, firewalls, VPN
concentrators, and ASAs, that act as endpoints to
establish, manage, and control VPN connections
 Appropriate software to create and manage VPN
tunnels
Describe encapsulating or encrypting the data
Encapsulation is also referred to as tunneling, because
within a VPN.
encapsulation transmits data transparently from network to
network through a shared network infrastructure.
Encryption codes data into a different format using a secret
key. Decryption decodes encrypted data into the original
unencrypted format.
6.3.4 Describe the three characteristics of secure
Data Confidentiality - Protects data from eavesdroppers
VPNs.
(spoofing).
Data Integrity - Guarantees that no tampering or alterations
occur.
Authentication - Ensures that only authorized senders and
devices enter the network.
6.3.5 Describe tunneling.
It allows the use of public networks like the Internet to carry
data for users as though the users had access to a private
network. Tunneling encapsulates an entire packet within
another packet and sends the new, composite packet over a
network.
What are the three classes of protocols that
Carrier protocol
tunneling uses?
The protocol over which the information is traveling
(Frame Relay, ATM, MPLS).
Encapsulating protocol
The protocol that is wrapped around the original data
(GRE, IPSec, L2F, PPTP, L2TP).
Passenger protocol
The protocol over which the original data was being
carried (IPX, AppleTalk, IPv4, IPv6).
CCNA EXP 4
CH.6 Teleworker Services
APRIL 2009
Describe GRE.
6.3.6 Describe encryption.
Describe some of the more common encryption
algorithms and the length of keys used.
Describe Symmetric Encryption.
What is the main disadvantage of symmetric
encryption?
How can you overcome the above
disadvantage?
Describe Asymmetric Encryption.
Describe a hash.
How does a hash work?
CCNA EXP 4
Generic Route Encapsulation (GRE) packet. GRE is a tunneling
protocol developed by Cisco Systems that can encapsulate a
wide variety of protocol packet types inside IP tunnels,
creating a virtual point-to-point link to Cisco routers at remote
points over an IP internetwork.
For encryption to work, both the sender and the receiver must
know the rules used to transform the original message into its
coded form. VPN encryption rules include an algorithm and a
key. An algorithm is a mathematical function that combines a
message, text, digits, or all three with a key. The output is an
unreadable cipher string. Decryption is extremely difficult or
impossible without the correct key.
Data Encryption Standard (DES) algorithm - Developed by
IBM, DES uses a 56-bit key, ensuring high-performance
encryption. DES is a symmetric key cryptosystem. Symmetric
and asymmetric keys are explained below.
Triple DES (3DES) algorithm - A newer variant of DES that
encrypts with one key, decrypts with another different key,
and then encrypts one final time with another key. 3DES
provides significantly more strength to the encryption
process.
Advanced Encryption Standard (AES) - The National Institute
of Standards and Technology (NIST) adopted AES to replace
the existing DES encryption in cryptographic devices. AES
provides stronger security than DES and is computationally
more efficient than 3DES. AES offers three different key
lengths: 128, 192, and 256-bit keys.
Rivest, Shamir, and Adleman (RSA) - An asymmetrical key
cryptosystem. The keys use a bit length of 512, 768, 1024, or
larger.
Shared secret key cryptography
Encryption & decryption use the same key
Typically used to encrypt the content of a message
Examples: DES, 3DES, AES
The question is, how do the encrypting and decrypting devices
both have the shared secret key? You could use e-mail,
courier, or overnight express to send the shared secret keys to
the administrators of the devices
Another easier and more secure method is asymmetric
encryption.
Public key cryptography
Encryption & decryption use different keys
Typically used in digital certification & key management
Example: RSA
A hash, also called a message digest, is a number generated
from a string of text. The hash is smaller than the text itself. It
is generated using a formula in such a way that it is extremely
unlikely that some other text will produce the same hash
value.
The original sender generates a hash of the message and
sends it with the message itself. The recipient decrypts the
message and the hash, produces another hash from the
CH.6 Teleworker Services
APRIL 2009
What is HMAC?
What are the two parameters of a HMAC?
Describe how a HMAC works.
Describe two common HMAC algorithms.
What are two peer authentication methods
used by VPNs?
6.3.7 Describe IPSec.
Describe the two main IPsec framework
protocols.
CCNA EXP 4
received message, and compares the two hashes. If they are
the same, the recipient can be reasonably sure the integrity of
the message has not been affected.
A keyed hashed message authentication code (HMAC) is a
data integrity algorithm that guarantees the integrity of the
message.
A message input and a secret key known only to the message
originator and intended receivers.
The message sender uses a HMAC function to produce a value
(the message authentication code), formed by condensing the
secret key and the message input. The message
authentication code is sent along with the message. The
receiver computes the message authentication code on the
received message using the same key and HMAC function as
the sender used, and compares the result computed with the
received message authentication code. If the two values
match, the message has been correctly received and the
receiver is assured that the sender is a member of the
community of users that share the key.
Message Digest 5 (MD5) - Uses a 128-bit shared secret key.
The variable length message and 128-bit shared secret key are
combined and run through the HMAC-MD5 hash algorithm.
The output is a 128-bit hash. The hash is appended to the
original message and forwarded to the remote end.
Secure Hash Algorithm 1 (SHA-1) - Uses a 160-bit secret key.
The variable length message and the 160-bit shared secret key
are combined and run through the HMAC-SHA-1 hash
algorithm. The output is a 160-bit hash. The hash is appended
to the original message and forwarded to the remote end.
Pre-shared key (PSK) - A secret key that is shared between the
two parties using a secure channel before it needs to be used.
PSKs use symmetric key cryptographic algorithms. A PSK is
entered into each peer manually and is used to authenticate
the peer. At each end, the PSK is combined with other
information to form the authentication key.
RSA signature - Uses the exchange of digital certificates to
authenticate the peers. The local device derives a hash and
encrypts it with its private key. The encrypted hash (digital
signature) is attached to the message and forwarded to the
remote end. At the remote end, the encrypted hash is
decrypted using the public key of the local end. If the
decrypted hash matches the recomputed hash, the signature
is genuine.
IPsec is protocol suite for securing IP communications which
provides encryption, integrity, and authentication. IPsec spells
out the messaging necessary to secure VPN communications,
but relies on existing algorithms.
Authentication Header (AH) - Use when confidentiality is not
required or permitted. AH provides data authentication and
integrity for IP packets passed between two systems. It
verifies that any message passed from R1 to R2 has not been
modified during transit. It also verifies that the origin of the
CH.6 Teleworker Services
APRIL 2009
data was either R1 or R2. AH does not provide data
confidentiality (encryption) of packets. Used alone, the AH
protocol provides weak protection. Consequently, it is used
with the ESP protocol to provide data encryption and tamperaware security features.
Encapsulating Security Payload (ESP) - Provides
confidentiality and authentication by encrypting the IP packet.
IP packet encryption conceals the data and the identities of
the source and destination. ESP authenticates the inner IP
packet and ESP header. Authentication provides data origin
authentication and data integrity. Although both encryption
and authentication are optional in ESP, at a minimum, one of
them must be selected.
What are some of the standard algorithms that DES - Encrypts and decrypts packet data.
IPSec uses?
3DES - Provides significant encryption strength over 56-bit
DES.
AES - Provides stronger encryption, depending on the key
length used, and faster throughput.
MD5 - Authenticates packet data, using a 128-bit shared
secret key.
SHA-1 - Authenticates packet data, using a 160-bit shared
secret key.
DH - Allows two parties to establish a shared secret key used
by encryption and hash algorithms, for example, DES and
MD5, over an insecure communications channel.
When configuring IPSec, what are the four IPsec
 When configuring an IPsec gateway to provide
framework squares that are to be filled?
security services, first choose an IPsec protocol. The
choices are ESP or ESP with AH.
 The second square is an encryption algorithm if IPsec
is implemented with ESP. Choose the encryption
algorithm that is appropriate for the desired level of
security: DES, 3DES, or AES.
 The third square is authentication. Choose an
authentication algorithm to provide data integrity:
MD5 or SHA.
 The last square is the Diffie-Hellman (DH) algorithm
group which establishes the sharing of key
information between peers. Choose which group to
use, DH1 or DH2.
CCNA EXP 4
CH.6 Teleworker Services
APRIL 2009
Download