VPN, TLS & Encrypted Channels
VPN, TLS & Kรชnh Mรฃ hรณa
IPSec โ Components & Modes
IPSec is a suite of protocols that secures IP communications. The exam heavily tests the distinction between AH vs ESP and tunnel vs transport mode. Get these four concepts perfectly clear.
AH vs ESP
- โ Provides integrity (data not modified)
- โ Provides authentication (source verified)
- โ NO ENCRYPTION โ data is still readable
- โข Useful when integrity matters but NAT traversal is needed (AH breaks NAT)
- โ Provides integrity + authentication
- โ Provides ENCRYPTION โ data is confidential
- โ Works with NAT traversal (NAT-T)
- โ Use ESP. It is always preferred over AH.
Tunnel Mode vs Transport Mode
| Mode | What Is Encrypted | Use Case | Example |
|---|---|---|---|
| Tunnel Mode | Entire original packet (original IP header + payload) โ new IP header added for routing | Site-to-site VPN between gateways. Hides both source/destination IPs of original packet. | TS โ Bank A H2H VPN; Corporate HQ โ Branch VPN |
| Transport Mode | Payload only โ original IP header remains in plaintext | Host-to-host communication where both endpoints run IPSec natively | Two servers communicating directly; end-to-end host security |
IKE negotiates IPSec security associations (SAs) and exchanges session keys. IKEv2 is current standard โ faster, more reliable, supports MOBIKE for mobile devices. IKE runs on UDP port 500 (IKEv1/v2) or UDP 4500 (NAT traversal).
TLS โ Version History & Key Features
TLS secures application-layer communications. Version matters enormously for CISSP โ deprecated versions represent real attack surface. Know which versions are acceptable and why.
| Version | Status | Key Issues / Notes |
|---|---|---|
| SSL 2.0 / SSL 3.0 | BROKEN | POODLE (SSLv3), DROWN attacks. Never use. These are SSL, not TLS. |
| TLS 1.0 | DEPRECATED | BEAST, POODLE variant. Prohibited by PCI-DSS 3.2+ since 2018. Never use. |
| TLS 1.1 | DEPRECATED | Deprecated by RFC 8996 (2021). No meaningful improvements over 1.0. Never use. |
| TLS 1.2 | ACCEPTABLE | Widely deployed. PFS is optional (depends on cipher suite). Acceptable minimum if TLS 1.3 not yet supported. |
| TLS 1.3 | CURRENT BEST | PFS mandatory (ECDHE only). Removed weak ciphers. Faster handshake (1-RTT, 0-RTT resumption). Use this. |
Critical TLS Concepts
Uses ephemeral (temporary) session keys generated fresh for each session. Even if the server's long-term private key is later stolen, recorded past sessions cannot be decrypted โ because the ephemeral keys are never stored. Requires ECDHE (Elliptic Curve Diffie-Hellman Ephemeral) or DHE key exchange. Mandatory in TLS 1.3.
HTTP response header: Strict-Transport-Security: max-age=31536000; includeSubDomains. Tells browsers to ALWAYS use HTTPS for the specified period. Prevents SSL stripping attacks and protocol downgrade. HSTS preloading adds the domain to browser's built-in HTTPS-only list โ protects even on first visit.
Standard TLS: only the SERVER presents a certificate (client verifies server). mTLS: BOTH client AND server present certificates โ bidirectional authentication. Used for service-to-service authentication where both parties must prove identity. Used in all Platform C microservices via Istio.
When split tunneling is enabled, only corporate-destined traffic goes through the VPN. All other traffic (internet browsing, cloud services) goes directly to the internet without VPN protection. Risk: if the device is compromised through the non-VPN path (e.g., visiting a malicious site), the attacker has access to corporate resources through the VPN tunnel from the same device. Best practice: disable split tunneling for production access. Use full tunnel VPN.
Key Terms
Suite of protocols providing authentication, integrity, and optional confidentiality for IP packets. Uses AH and/or ESP.
IPSec protocol providing integrity and authentication but NO encryption. Protocol 51. Breaks NAT.
IPSec protocol providing integrity, authentication, AND encryption. Protocol 50. Always preferred over AH.
IPSec mode that encrypts the entire original packet including IP header. Used for site-to-site VPNs between gateways.
IPSec mode that encrypts only the payload, leaving the original IP header intact. Used for host-to-host communication.
Negotiates IPSec security associations and exchanges cryptographic keys. IKEv2 is current standard.
Current TLS standard. Mandates PFS via ECDHE. Removed weak cipher suites. 1-RTT handshake. Best practice.
Ephemeral session keys ensure past sessions cannot be decrypted even if long-term private key is compromised.
Elliptic Curve Diffie-Hellman Ephemeral โ the key exchange algorithm providing PFS in TLS 1.3.
HTTP Strict Transport Security โ forces browsers to always use HTTPS. Prevents SSL stripping and protocol downgrade.
Mutual TLS โ both client and server authenticate with certificates. Used for service-to-service auth.
VPN configuration where only corporate traffic goes through tunnel. Security risk โ compromised device can pivot into corporate network.
- IPSec tunnel mode = entire packet (for VPN gateways โ hides original IP headers); transport mode = payload only (host-to-host โ original headers visible). Site-to-site VPN always uses tunnel mode.
- AH = NO encryption; ESP = encryption included. For any question asking which provides confidentiality, the answer is always ESP. AH only provides integrity and authentication.
- TLS 1.3 mandates PFS via ECDHE; TLS 1.2 makes it optional (depends on which cipher suite is negotiated). ECDHE cipher suites in TLS 1.2 provide PFS; RSA key exchange does not.
- mTLS = BOTH parties authenticate with certificates; standard TLS = server only. In mTLS, the client also presents a certificate โ used for service mesh (Istio), B2B APIs, and machine-to-machine auth.
- Split tunneling is a security risk โ an infected device can attack corporate resources through the VPN tunnel while its internet traffic bypasses all corporate controls.
- Bank A H2H VPN: Uses IPSec tunnel mode โ site-to-site between FinTech Company X GCP and Bank A datacenter. Full packet encryption (ESP). Both original IP headers are hidden in transit. Verify IKEv2 (not IKEv1) and ESP with AES-256 cipher suite.
- Partner A H2H VPN: Same pattern โ IPSec tunnel mode. Verify the security association negotiation uses strong ciphers and PFS in IKEv2 (DH group 14 or higher).
- All Platform C microservices โ mTLS via Istio: Every pod has a client certificate issued by Istio's certificate authority. All service-to-service calls require mutual authentication. Verify Istio PeerAuthentication policies are set to
STRICTmode in all namespaces โ not PERMISSIVE (which allows unauthenticated traffic). - Public APIs โ TLS 1.3 + HSTS: CloudFlare enforces TLS at the edge. Configure minimum TLS 1.2 with TLS 1.3 preferred on CloudFlare SSL/TLS settings. HSTS must be enabled with minimum max-age of 1 year for all public domains.
- Action โ Split tunneling: Verify remote engineers accessing production Vault and GCP resources use full-tunnel VPN. No split tunneling for privileged access.
Practice Quiz โ VPN & TLS
Q1. FinTech Company X connects to Bank A via a site-to-site VPN. Which IPSec mode should be used?
Q2. Which IPSec protocol provides encryption (confidentiality)?
Q3. How does TLS 1.3 improve on TLS 1.2 regarding Perfect Forward Secrecy?
Q4. How does mTLS differ from standard TLS?
Q5. A remote engineer uses split tunneling VPN for production access. What is the primary security risk?