Podcast
Questions and Answers
Which SA is negotiated during phase 1?
Which SA is negotiated during phase 1?
- Both IKE SA and IPsec SA
- Neither IKE SA nor IPsec SA
- IPsec SA
- IKE SA (correct)
Which SA is used for encrypting the data sent through the tunnel?
Which SA is used for encrypting the data sent through the tunnel?
- IPsec SA (correct)
- Neither IKE SA nor IPsec SA
- IKE SA
- Both IKE SA and IPsec SA
Which version of IKE is considered the legacy version?
Which version of IKE is considered the legacy version?
- Both IKE-v1 and IKE-v2
- IKE-v1 (correct)
- Neither IKE-v1 nor IKE-v2
- IKE-v2
Which version of IKE is considered simpler to operate?
Which version of IKE is considered simpler to operate?
Which version of IKE exclusively supports the network ID feature?
Which version of IKE exclusively supports the network ID feature?
Which version of IKE is best suited for SD-WAN deployments?
Which version of IKE is best suited for SD-WAN deployments?
Which version of IKE supports denying access to spokes without using a certificate signature?
Which version of IKE supports denying access to spokes without using a certificate signature?
Which version of IKE supports establishing multiple AD-VPN shortcuts between the same pair of local and remote gateway addresses?
Which version of IKE supports establishing multiple AD-VPN shortcuts between the same pair of local and remote gateway addresses?
Which version of IKE is often preferred for security-wise deployments?
Which version of IKE is often preferred for security-wise deployments?
Which topology is commonly used in SD-WAN deployments using IPsec overlays?
Which topology is commonly used in SD-WAN deployments using IPsec overlays?
Which protocol negotiates the private keys, authentication method, and encryption for creating an IPsec tunnel?
Which protocol negotiates the private keys, authentication method, and encryption for creating an IPsec tunnel?
What is the outcome of Phase 1 in IKE?
What is the outcome of Phase 1 in IKE?
What is the outcome of Phase 2 in IKE?
What is the outcome of Phase 2 in IKE?
Which version of IKE is known for its wider adoption and is considered legacy?
Which version of IKE is known for its wider adoption and is considered legacy?
Which version of IKE is known for its simpler operation, more features, and increasing adoption?
Which version of IKE is known for its simpler operation, more features, and increasing adoption?
Which version of IKE is usually preferred for SD-WAN and has a network ID feature for AD-VPN?
Which version of IKE is usually preferred for SD-WAN and has a network ID feature for AD-VPN?
What are SAs in the context of IPsec?
What are SAs in the context of IPsec?
What happens if both sides cannot agree on the security rules for sending data and verifying each other's identity in an IPsec tunnel?
What happens if both sides cannot agree on the security rules for sending data and verifying each other's identity in an IPsec tunnel?
What needs to happen when SAs expire in an IPsec tunnel?
What needs to happen when SAs expire in an IPsec tunnel?
How many distinct phases does IKE use?
How many distinct phases does IKE use?
Which direction is most of the IPsec overlay traffic initiated from?
Which direction is most of the IPsec overlay traffic initiated from?
Where are the workloads located that are protected by the hub?
Where are the workloads located that are protected by the hub?
Why is SD-WAN usually deployed on the spokes only?
Why is SD-WAN usually deployed on the spokes only?
In which direction is traffic also initiated, requiring SD-WAN on the hub side?
In which direction is traffic also initiated, requiring SD-WAN on the hub side?
What routing protocol is used to exchange routing information through the overlays?
What routing protocol is used to exchange routing information through the overlays?
What are the IP subnets used for the overlays established over the ISP1 underlay?
What are the IP subnets used for the overlays established over the ISP1 underlay?
What are the IP subnets used for the overlays established over the ISP2 underlay?
What are the IP subnets used for the overlays established over the ISP2 underlay?
What is the goal for all sites in terms of exchanging prefixes over overlays?
What is the goal for all sites in terms of exchanging prefixes over overlays?
Why is dynamic routing preferred over static routing in this scenario?
Why is dynamic routing preferred over static routing in this scenario?
What is AD-VPN?
What is AD-VPN?