VPN Top 100 Interview Questions and Answers: Ques 1. What Is VPN?
VPN Top 100 Interview Questions and Answers: Ques 1. What Is VPN?
Remote Access VPN connects individual user (end hosts) to private networks. In a remote access
VPN situation, every user needs their own VPN client.
Site-to-Site VPN solutions enable businesses to connect and transport data using encryption and
other security protocols. To securely relay information across the Public Internet, the VPN uses a
security method called IPsec to build an encrypted tunnel from the provider's network to the
customer's site.
Integrity -
Integrity of information refers to protecting information from being modified by unauthorized
parties. Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its
entire life cycle. Data must not be changed in transit, and steps must be taken to ensure that data
cannot be altered by unauthorized people. Commonly used methods to protect data integrity
includes hashing the data you receive and comparing it with the hash of the original message.
Ques 4. Enlist some of key security considerations while deploying VPN solution?
Some of key consideration while deploying VPN solution are shared below -
VPN connections should traverse through firewall.
An IDS / IPS is recommended in order to monitor attacks more effectively.
Anti-virus software should be installed on remote clients.
Unsecured or unmanaged systems with simple or no authentication should not be allowed
to make VPN connections to the internal network.
Logging and auditing functions should be provided especially of unauthorized attempts
VPN Public Interface (Internet facing) should be in Demilitarized Zone (DMZ)
It is advisable not to use split tunnelling to access the Internet or any other insecure network
simultaneously during a VPN connection. If split tunneling is used, a firewall and IDS should
be used to detect and prevent any potential attack coming from insecure networks.
Transport mode is the mode where only the payload of the original IP packet is protected
(encrypted, authenticated, or both). The payload is encapsulated by the IPsec headers and
trailers. The original IP headers remain intact, except that the IP protocol field is changed to
be ESP (50). Transport mode is used only when the IP traffic to be protected is between the
IPsec peers themselves, the source and destination IP addresses on the packet are the same
as the IPsec peer addresses.
Ques 8. Is VPN a Long-term Solution or a Short-term arrangement?
VPNs are obviously long-term solution. The key challenge that VPN address is privacy over a public
network and this doesn’t seem to be going anywhere. Hence, VPNs will exist to be used across
desktops, laptops and servers.
Ques 10. What is name of cisco VPN Client installed on end devices?
AnyConnect Client
Ques 11. Does Cisco 4000 Series Router IOS support SSL VPN?
No, till date Cisco ISR 4000 Series Routers don’t support SSL VPN.
Ques 15. What are the three main security services that IPSec VPN provides?
3 main security services that IPSec VPN provides are -
Peer Authentication
Data Confidentiality
Data Integrity
ESP protocol provides data confidentiality (encryption) and authentication (data integrity, data
origin authentication, and replay protection). ESP can be used with confidentiality only,
authentication only, or both confidentiality and authentication. When ESP provides authentication
functions, it uses the same algorithms as AH, but the coverage is different.
IKE Phase 1 -
The primary purpose of IKE phase 1 is to authenticate the IPsec peers and to set up a secure channel
between the peers for IKE exchanges to take place. IKE phase 1 functions include -
Authentication and protection IPsec peers identities
Negotiation of matching IKE SA policy between peers
Performs an authenticated Diffie-Hellman exchange to get matching shared secret keys
Sets up a secure tunnel to negotiate IKE phase 2 parameters.
IKE phase 1 occurs in two modes: main mode and aggressive mode
IKE Phase 2 -
During IKE phase 2 negotiation of IPsec SAs occurs to set up the IPSec tunnel. IKE phase 2 performs
the following functions -
Negotiates IPSec SA parameters
Establishes IPsec SAs
Periodically renegotiates IPSec SAs
Performs Diffie-Hellman exchange (Optional)
IKE phase 2 has only one mode - Quick mode. Quick mode occurs after IKE has established the
secure tunnel in phase 1. It negotiates a shared IPSec policy, derives shared secret keying material
used for the IPSec security algorithms, and establishes IPSec SAs. Quick mode exchanges shared
secret key material and prevent replay attacks from generating bogus SAs.
Ques 28. Explain the messages exchange between the peers in IKE/ISAKMP?
Below graph shows step by step IKE communication in phase 1 and phase 2. While steps 1 to 5 are
from phase 1, steps 6 to 9 take place during phase 2.
This example will help show how Diffie-Hellman works end to end –
Each party i.e. both Nick and John create a pair of one private key and one public key. When
establishing secure connection, Nick sends John his public key and John sends Nick his public key. By
combining theirs private key and other party’s public key they both get to the same shared secret.
This shared secret key is then used to encrypt/decrypt messages Nick and John send to each other.
Ques 35. In a SSL VPN architecture, where are the session keys stored.
The keys are derived dynamically.
Standard behaviour of VPN is to route all your internet traffic through an encrypted tunnel towards
Data Centre to protect your data from attack (Without Split-Tunnelling).
However, with Split tunnelling enabled, VPN users are able to connect to corporate applications at
Data Centre through the VPN connection while activities like Internet browsing, FTP etc. are
accessed directly via local Internet rather than taking VPN path to Data Centre through VPN tunnel.
Below are the benefits that can be reaped from split tunneling -
One advantage of using split tunnelling is that it alleviates bottlenecks and conserves
bandwidth as Internet traffic does not have to pass through the VPN server.
Cost is saved
Latency will not suffer for end users while web surfing
Users get best performance of whatever ISP they are connected to
Ques 39. How do you verify the status of the tunnel’s phase 1 & 2?
Phase 1 – show crypto isakmp sa
Phase 2 – show crypto ipsec sa
Ques 47. What are the 3 key methods to Control the access of VPN users and allowing access
to selective resources?
3 key methods to Control the access of VPN users are -
Access control lists (ACLs) and downloadable ACLs
Split tunneling
Access hours/time range
Ques 48. What are the two IKE methods used by the IPsec protocol for secure tunnel
negotiation?
IKEv1 and IKEv2
DMVPN stands for Dynamic Multipoint VPN. It is a Point to Multipoint working on GRE technology.
DMVPN can have following topologies –
(1) Hub and Spoke
(2) Spoke to Spoke.
The 2 key technologies DMVPN relies to function are –
NHRP
MGRE
NHRP is similar to ARP in LAN technologies. It is a layer 2 resolution protocol and cache. The Hub
maintains a special NHRP database with the public IP Addresses of all configured spokes. Each spoke
registers its public IP address with the hub and queries the NHRP database for the public IP address
of the destination spoke it needs to build a VPN tunnel.
mGRE Tunnel Interface is used to allow a single GRE interface to support multiple IPSec tunnels and
helps dramatically to simplify the complexity and size of the configuration. With an mGRE tunnel,
the hub router only needs to have a single tunnel interface, with n number of destinations.
Ques 53. Why PPTP is not preferred choice in many VPN deployments?
The 2 key reasons why PPTP is not preferred choice in many deployments are –
PPTP does not offer data integrity or data origin verification.
PPTP does not provide best of performance in unstable connections.
Ques 54. Can you explain CHAP?
CHAP is abbreviation for Challenge Handshake Authentication Protocol and is defined in RFC 1994.
CHAP verifies the identity of the peer by means of a three-way handshake. Below are the steps
performed in CHAP communication -
CHAP is negotiated between both devices, the authenticator sends a challenge message to
the peer.
The peer responds with a value calculated through a one-way hash function (Message Digest
5 (MD5)).
The authenticator checks the response against its own calculation of the expected hash
value. If the values match, the authentication is successful. Otherwise, the connection is
terminated.
Ques 56. What does PPTP use for encryption and authentication?
PPTP encryption uses MPPE 128bit cipher with or without compression and MS-CHAPv2
authentication.
Ques 61. Who Are the Major VPN Players In enterprise VPN Market?
Cisco and Juniper are major players in Enterprise VPN market.
Other VPN providers are listed below -
NordVPN
StrongVPN
IPVanish VPN
PureVPN
Ques 62. What is SSL VPN?
SSL in abbreviation for Secure Socket Layer. SSL is one such protocol that is used to provide
confidentiality and authenticity over Internet. An SSL VPN is a form of VPN technology that can be
used with a standard Web browser.
IPsec VPN technology is used for both end user and site-to-site connectivity while SSL VPN
technology is used exclusively for user connectivity and is ideal for creating a VPN tunnel through
restricted networks back to the home site.
Site to Site VPN– This type of VPN can be used when multiple Remote endpoints are present and
can be made to join to a single network. Machines present on these remote locations work as if they
are working on a single network.
Ques 66. By default, how many message pairs are exchanged in a typical IKEv2 connection?
2
Ques 68. What are some of key challenges and issues faced while deploying or management
of remote access VPN?
Below are the challenges -
VPN client software must be supported on all user devices like PCs, laptops, tablets and
smartphones.
VPN protocols must work end-to-end through firewalls, routers and switches.
Only those VPN solutions should be selected which are compatible and interoperable with
concentrators, appliances and servers.
Ques 69. What are some of key challenges and issues faced while deploying or management
of Site to Site VPN?
Below are the challenges -
Activity logging becomes a challenging and cumbersome job
Firewall Blocking Challenges
Connecting two remote networks requires configuration and management of advanced
forwarding routing rules.
Subnet Conflicts - Networks connected via traditional VPN must not use the same local
subnet. Workaround is to use NAT in order to deal with the overlapping addressing schemes
– a process intensive and complex work.
The design and security implementation for a virtual private network requires highly skilled
professional to setup best fit VPN solution.
Ques 70. Which method enables you to prevent user web traffic from traveling through the
VPN tunnel?
Split Tunneling
Ques 75. What are the available VPN Client IP Address Allocation methods is ASA?
Following are the IP address allocation methods in ASA -
Authentication server
DHCP
Internal address pools
Direct user assignment
Ques 76. An AnyConnect client uses which protocol through a VPN tunnel for automatic
Certificate retrieval?
SCEP
Ques 81. A user is complaining of being unable to open external or internal URLs directly or
from the bookmark list. What could be the problem?
The administrator has not configured a DNS server group.
Ques 82. In a Cisco Remote-Access VPN Client, which files hold connection entry information?
Connection entries are stored in PCF file.
Ques 83. What is the default MTU size set during installation of IPsec VPN Client on windows
PC?
1300
Ques 84. What is difference between MPLS and VPN?
Ques 85. What is difference between VPN and proxy?
Ques 86. Does Cisco ASA support VPN is Multi-context mode? If yes, then which Release
onwards is the feature supported?
Yes, Cisco ASA supports both Site to Site and Remote Access VPN. Below is the releases supporting
this feature -
Site-to-Site VPN - 9.0(1) onwards
Remote Access VPN - 9.5(2) onwards
Ques 87. There is requirement to setup a VPN box in Data Center. Which Security Zone should
the Internet/Public facing VPN box be connected to be reachable for Internet based users?
The VPN Box outside interface should be connected to DMZ Zone.
Ques 88. What is NAT Traversal? What is the purpose of using NAT-T?
NAT-T is an IKE phase 1 algorithm that is used when trying to establish an IPSEC VPN between two
gateway devices where there is a NAT device in front of one of the gateway devices or both the
gateway devices.
If a packet is encapsulated by ESP or AH header (due to IPsec), PAT/NAT device will not have port
information to translate source port and resulting IPSEC traffic will not pass through the PAT/NAT
device. However, if we use NAT-T Feature, IPSEC traffic will be encapsulated using UDP header with
source and destination port number as 4500 and provides port information for the NAT device to do
Port Address Translation.
Ques 89. Which IP protocol does AH and ESP headers use in IPSEC.
ESP and AH use IP protocol 50 and 51 respectively.
Ques 90. Which type of VPN would you use if data has to be encrypted at the network layer?
IPSEC VPN will be used since IPSEC VPN encrypts data at the network layer whereas SSL encrypts
data at the application layer.
Ques 93. Which command shows the ISAKMP SA built between peers?
Show crypto isakmp sa
Ques 94. Which command is issued to view the IKE Phase 1 management connections?
Use the “show crypto isakmp sa” command
Ques 95. what are all the probable states of IKE Phase 1 main Mode –
Belo are the 4 probable states -
MM_NO_STATE
MM_SA_SETUP
MM_KEY_EXCH
MM_KEY_AUTH
Ques 97. Which ports on firewall should be allowed for IPSEC Site to Site VPN?
UDP port 500 and 4500 should be used
Ques 98. What is the advantage of using VPN technologies over WAN technologies?
Enlisted below are the benefits that can be reaped from VPN compared to other WAN technologies -
Reduced cost (compared to higher provisioning costs of long distance leased lines and
supporting these WAN Links)
More scalable than other WAN solutions
Faster provisioning and lesser deployment time
Increased productivity since it allows roaming users to connect to corporate resources from
anywhere anytime.
Reduces risk of security breaches by cyberattacks.
Reachable where leased links and other WAN technologies are not feasible.