Deploying IPsec Remote Access VPNs Using Preshared Key and Digital Signature Authentication

Review Questions


What are some of the main benefits and drawbacks of IPsec remote access VPNs?


What are the two main types of issue with regard to IKEv1 an IPsec remote access VPN environment?


What are the three main methods by which a VPN gateway can authenticate remote access VPN users when using IKEv1?


What sort of functionality can Mode Config provide?


What information does the debug crypto isakmp sa command display?


What methods do the VPN 3000 concentrator and Cisco ASA 5500 provide to overcome issues with NAT/PAT and IPsec remote access VPNs?


When a hardware client (Cisco IOS router) is configured for EZVPN, how does a remote access user authenticate him/herself?


What are the three basic ways to configure high availability for IPsec remote access VPNs?


To allow IPsec remote access VPN connections through a firewall, which ports may have to be opened on the firewall?


What file can be modified to provide auto-initiation of Cisco VPN Client connections with wireless VPNs?

Designing and Building SSL Remote Access VPNs (WebVPN)

Comparing, Designing, and Deploying VPHs
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors: Mark Lewis
Simiral book on Amazon © 2008-2017.
If you may any questions please contact us: