Term
|
Definition
| Mobile worker to business site |
|
|
Term
|
Definition
| Encrypts the original header and creates a new header |
|
|
Term
| What is provided by AH when using IPSec? |
|
Definition
|
|
Term
| What does ESP provide that AH alone can't? |
|
Definition
|
|
Term
| ESP and AH cannot be used simultaneously? T/F? |
|
Definition
|
|
Term
|
Definition
Established bidirectional IKE SA Authenticate peer |
|
|
Term
|
Definition
Negotiates IPSec policies When complete, unidirectional IPSec SAs are established for each protocol/algorithm combination Transform sets are negotiated |
|
|
Term
| What is the purpose of the Crypto ACL? |
|
Definition
| To determine what traffic will be tunneled and what will be sent in planin text to the appropriate next hop |
|
|
Term
| The crypto ACLs on both ends of a VPN tunnel should have what relationship? |
|
Definition
| They should be mirror images of each other |
|
|
Term
| SSL remote access VPN characteristics |
|
Definition
No client software reuuired Works for a limited number of applications such as web-browsing and email |
|
|
Term
| IPSec remote access VPN characteristics |
|
Definition
Works for all IP-based applications Clients must have specialized software Has a stronger auth method The stronger security method |
|
|
Term
| What type of VPN assigns host pc a new IP address |
|
Definition
|
|
Term
|
Definition
| Adding a static route entry for a PC when using remote access VPNs |
|
|