CCNA Security Interview Questions
CCNA Security Interview Questions
Q. What is a firewall?
A: A firewall is used to provide security to the private networks connected to the internet. They
can be implemented as hardware or software, or a combination of both. All incoming and
outgoing network traffic are examined and accepted/rejected by the firewall as per defined rules.
Q. What are the types of Firewall?
A: Packet Filtering (Work on Network Layer)
Application Firewall or Proxy (Work on Application Layer)
Circuit Level Firewall (Work On session Layer)
Stateful Firewall (Work all the Layers)
Q. What is VPN?
Virtual Private Network (VPN) creates a secure network connection over a public network such
as the internet. It allows devices to exchange data through a secure virtual tunnel. It uses a
combination of security features like encryption, authentication, tunneling protocols, and data
integrity to provide secure communication between participating peers.
Q. What are the different types of VPN?
Answer:
Remote Access VPN:- Also called as Virtual Private dial-up network (VPDN) is mainly
used in scenarios where remote access to a network becomes essential. Remote access VPN
allows data to be accessed between a company’s private network and remote users through a
third party service provider; Enterprise service provider. E.g Sales team is usually present over
the globe. Using Remote access VPN, the sales updates can be made.
Site to Site VPN – Intranet based: This type of VPN can be used when multiple Remote
locations are present and can be made to join to a single network. Machines present on these
remote locations work as if they are working on a single network.
Site to Site VPN – Extranet based: This type of VPN can be used when several different
companies need to work in a shared environment. E.g. Distributors and service companies. This
network is more manageable and reliable.
Q. What is IP-Sec?
IP Sec: Set of rules for securing data communication across a public, untrusted network such as
the Internet.
Q. What is VPN and describe IPsec VPN
A: Virtual Private Network (VPN) creates a secure network connection over a public network
such as the internet.
IPsec VPN means VPN over IP Security allows two or more users to communicate in a secure
manner by authenticating and encrypting each IP packet of a communication session.
Q. What is VPN & Types explain them?
VPN: Virtual Private Network – Establishing connection between two private networks (trusted
sites) over the internet (Untrusted sites) is called VPN.
Types of VPN:
Site to Site VPN
Remote Access VPN
Site to Site VPN: Connect branch office to Head office. Branch office users can use the
resources such as email, files, printers are located in head office. Site to Site VPN user IPSEC to
provide data Security.
Remote Access VPN: Remote Access VPN provides secure access for remote users. Remote
users required VPN client software to connect & access the office resource from the remote
location or home.
Q. What is the difference between Cisco VPN Client and Anyconnect VPN Client?
A. The underlying protocol used by the client are different, IPSec client will use IKE where Any
Connect will use SSL encryption. There is difference in the compatibility with OS (support in
vista both 32 and 64 bit, win XP, win 2k, MAC OS X, and RED HAT linux version 9 or
higher ) , wherein it is required to install the package initially or pushed from ASA, and no admin
privilege are required subsequently, hence less admin overheads required for installing and
maintaining IPSec Client.
Q. I have AnyConnect configured but whenever I tried to connect it through web it connect
as clientless VPN rather running Any Connect profile. What could be issue?
A. We will have to check the configuration from the ASA. However, the common issue will be
that SVC protocol is not enabled in the group-policy
A site-to-site VPN allows offices in multiple locations to establish secure connections with each
other over a public network such as the Internet.
Remote Access VPN allows Remote users to connect to the Headquarters through a secure tunnel
that is established over the Internet. The remote user is able to access internal, private web pages
and perform various IP-based network tasks.
There are two primary methods of deploying Remote Access VPN:-
1.Remote Access IPsec VPN.
2. Remote Access Secure Sockets Layer (SSL) VPN.
Authentication - Verifies that the packet received is actually from the claimed sender. It verifies
the authenticity of sender. Pre-shared Key, Digital Certificate are some methods that can be used
for authentication.
Integrity - Ensures that the contents of the packet has not been altered in between by man-in-
middle. Hashing Algorithm includes MD5, SHA.
Confidentiality - Encrypts the message content through encryption so that data is not disclosed to
unauthorized parties. Encryption algorithms include DES (Data Encryption Standard), 3DES
(Triple-DES), AES (Advanced Encryption Standard).
A. For Any Connect VPN over Web TCP port 443 should be open (unless changed). If DTLS is
used; ISP should also have the DTLS port to be opened on the path. By Default on ASA TLS and
DTLS port are configured to 443.
A. Yes. Client Authentication is supported in SSL VPN including Any Connect. Client
Certificate is also supported. The ASA can check the Client Certificate and you can have the
certificate maps as well. Similar to LDAP Map Certificate Map can also be created. The user who
belongs to a department called sales will have the certificate with the OU as sales. This user is
automatically binded to the sales group.
To clear IPsec SAs by entry: Clear IPsec SAs entry ip address
To clear IPsec SAs by map: Clear IPsec SAs map cryptomap _name