Deploying IPsec Remote Access VPNs Using Preshared Key and Digital Signature Authentication

Review Questions

1

What are some of the main benefits and drawbacks of IPsec remote access VPNs?

2

What are the two main types of issue with regard to IKEv1 an IPsec remote access VPN environment?

3

What are the three main methods by which a VPN gateway can authenticate remote access VPN users when using IKEv1?

4

What sort of functionality can Mode Config provide?

5

What information does the debug crypto isakmp sa command display?

6

What methods do the VPN 3000 concentrator and Cisco ASA 5500 provide to overcome issues with NAT/PAT and IPsec remote access VPNs?

7

When a hardware client (Cisco IOS router) is configured for EZVPN, how does a remote access user authenticate him/herself?

   
8

What are the three basic ways to configure high availability for IPsec remote access VPNs?

9

To allow IPsec remote access VPN connections through a firewall, which ports may have to be opened on the firewall?

10

What file can be modified to provide auto-initiation of Cisco VPN Client connections with wireless VPNs?


Designing and Building SSL Remote Access VPNs (WebVPN)





Comparing, Designing, and Deploying VPHs
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors: Mark Lewis
Simiral book on Amazon

Flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net