VPN Interview Questions and Answers
VPN Interview Questions and Answers
What is VPN?
Virtual Private Network (VPN) creates a secure network connection over a public network such as the internet. It
allows devices to exchange data through a secure virtual tunnel. It uses a combination of security features like
Bu
encryption, authentication, tunneling protocols, and data integrity to provide secure communication between
participating peers. Ques
Privacy - Terms
networkerinterview.net/entries/vpn/vpn-interview-questions-and-answers 1/9
7/1/24, 5:02 PM VPN Interview Questions and Answers | Networker Interview
What are the three main security services that IPSec VPN provides? Foll
What is Authorization?
Authorization is a security mechanism used to determine user/client privileges or access levels related to
network resources, including firewalls, routers, switches and application features. Authorization is normally
preceded by authentication and during authorization, It’s the system that verifies an authenticated user’s access
rules and either grant or refuses resource access.
2. Authentication Header (AH) - It is also an IP-based protocol that uses protocol 51 for communication between
IPSec peers. AH is used to protect the integrity and authenticity of the data and offers anti-replay protection.
Unlike ESP, AH provides protection to the IP header also.
Drawback - AH does not provide confidentiality protection.
networkerinterview.net/entries/vpn/vpn-interview-questions-and-answers 2/9
7/1/24, 5:02 PM VPN Interview Questions and Answers | Networker Interview
What is IKE?
It is a hybrid protocol that implements Oakley and SKEME key exchanges inside the Internet Security
Association and Key Management Protocol (ISAKMP) framework. It defines the mechanism for creating and
exchanging keys. IKE derives authenticated keying material and negotiates SAs that are used for ESP and AH
protocols.
At the end of phase 1, a bidirectional ISAKMP/IKE SA (phase 1 SA) is established for IKE communication.
Phase 2
IKE phase 2 protects the user data and establishes SA for IPSec.
There is one mode in IKE phase 2:
Quick mode - In this mode, Three messages are exchanged to establish the phase 2 IPSec SA.
At the end of phase 2 negotiations, two unidirectional IPSec SAs (Phase 2 SA) are established for user data—one
for sending and another for receiving encrypted data.
MESSAGE 1: Initiator offers Policy proposal which includes encryption, authentication, hashing algorithms (like
AES or 3DES, PSK or PKI, MD5 or RSA).
MESSAGE 2: Responder presents policy acceptance (or not).
MESSAGE 3: Initiator sends the Diffie-Helman key and nonce.
MESSAGE 4: Responder sends the Diffie-Helman key and nonce.
MESSAGE 5: Initiator sends ID, preshare key or certificate exchange for authentication.
MESSAGE 6: Responder sends ID, preshare key or certificate exchange for authentication.
Only First Four messages were exchanged in clear text. After that, all messages are encrypted.
networkerinterview.net/entries/vpn/vpn-interview-questions-and-answers 3/9
7/1/24, 5:02 PM VPN Interview Questions and Answers | Networker Interview
What is Diffie-Hellman?
DH is a public-key cryptography protocol which allows two parties to establish a shared secret over an insecure
communications channel. Diffie-Hellman is used within IKE to establish session keys and is a component of
Oakley.
What is the difference between Static Crypto Maps and Dynamic Crypto Maps?
Static Crypto Maps are used when peers are predetermined. It is basically used in IPSec site to site VPNs.
Dynamic crypto maps are used with networks where the peers are not always predetermined. It is basically used
in IPSec Remote Access VPNs.
networkerinterview.net/entries/vpn/vpn-interview-questions-and-answers 4/9
7/1/24, 5:02 PM VPN Interview Questions and Answers | Networker Interview
What is DMVPN?
DMVPN allows IPSec VPN networks to better scale hub-to-spoke and spoke-to-spoke topologies optimizing the
performance and reducing latency for communications between sites.
It offers the following benefits:
1. It Optimizes network performance.
2. It Reduces router configuration on the hub.
3. Support for dynamic routing protocols running over the DMVPN tunnels.
4. Support for multicast traffic from hub to spokes.
5. The capability of establishing direct spoke-to-spoke IPsec tunnels for communication between sites without
having the traffic to go through the hub.
Phase 2 - In phase 2 all spokes routers also use multipoint GRE tunnels so we do have direct spoke to spoke
tunneling. When a spoke router wants to communicate to another spoke it will send an NHRP resolution request
to the hub to find the NBMA IP address of the other spoke. Summarization is not possible in phase 2.
Full Process:
1. Spoke 1 forwards a packet with a next hop which is another spoke (spoke 2). There is no NHRP map entry for
this spoke so an NHRP resolution request is sent to the hub.
2. The request from spoke 1 contains the tunnel IP address of the spoke 2 so the hub relays the request to spoke
2.
3. Spoke 2 receives the request, adds its own address mapping to it and sends it as an NHRP reply directly to
spoke 1.
4. Spoke 2 then sends its own NHRP resolution request to the hub that relays it to spoke 1.
5. Spoke 1 receives the request from spoke 2 via the hub and replies by adding its own mapping to it and sending
it directly to spoke 2.
Spoke to Spoke tunnel is established.
Phase 3 - In phase 3 NHRP redirect configured on the hub tells the initiator spoke to look for a better path to the
destination spoke. On receiving the NHRP redirect message the spokes communicate with each other over the
hub and they have their NHRP replies for the NHRP Resolution Requests that they sent out.
NHRP Shortcut configured on the spoke updates the CEF table. It basically changes the next-hop value for a
networkerinterview.net/entries/vpn/vpn-interview-questions-and-answers 5/9
7/1/24, 5:02 PM VPN Interview Questions and Answers | Networker Interview
remote spoke from the initial hub tunnel IP address to the NHRP resolved tunnel IP address of remote spoke.
Summarization is possible in phase 3.
What is GRE?
Generic Routing Encapsulation Protocol is a tunneling protocol developed by Cisco designed to encapsulate IP
unicast, multicast and broadcast packets. It uses IP protocol number 47.
2. Thin client mode - It works at Layer 7 and is also known as port forwarding. Thin client mode provides remote
access to TCP-based services such as Telnet, Secure Shell (SSH), Simple Mail Transfer Protocol (SMTP), Internet
Message Access Protocol (IMAP) and Post Office Protocol (POP3) applications. Thin client is delivered via a Java
applet that is dynamically downloaded from the SSL VPN appliance upon session establishment.
3. Thick client mode - It works at Layer 3 and is also known as tunnel mode or full tunneling client. The thick
client mode provides extensive application support through dynamically downloaded SSL VPN Client software
or the Cisco AnyConnect VPN client software from the VPN server appliance. This mode delivers a lightweight,
centrally configured, and easy-to-support SSL VPN tunneling client that provides full network layer (Layer 3)
access to virtually any application.
networkerinterview.net/entries/vpn/vpn-interview-questions-and-answers 6/9
7/1/24, 5:02 PM VPN Interview Questions and Answers | Networker Interview
2. The server will send back a SERVER-HELLO message Which contains Version Number (Server selects SSL
version that is supported by both the server and the client), Cipher Suits (selected by server the best cipher suite
version that is supported by both of them), Session ID, Random Data.
3. The server also sends PKI certificate for authenticating himself signed and verified by Certificate Authority
along with the public key for encryption.
4. The server will then send Server Hello Done indicating that the server has finished sending its hello message,
and is waiting for a response from the client.
5. Client will send its certificate if the server has also requested for client authentication in server hello message.
6. Client will send the Client Key Exchange message after calculating the premaster secret with the help of the
random values of both the server and the client. This message is sent by encrypting it with the server's public key
which was shared through the hello message.
The server will decrypt the premaster secret with its private key. Now both client and server will perform a series
of steps to generate session keys (symmetric) which will be used for encryption and decryption of data exchanges
during SSL session and also to verify its integrity.
7. Client will send CHANGE CIPHER SUITE message informing the server that future messages will be
encrypted using session key.
8. Client will send CLIENT FINISH (DONE) message indicating that the client is done.
Buy VPN & ASA Firewall Interview Questions and Answers Pdf - 3 $
Go Back
16 comments Posted in VPN Tags ipsec vpn interview ssl vpn dmvpn vpn tunnel site to site vpn remote access vpn gre cryptomap encryption diffie hellman isakmp vpn notes
Share
vinayak vavhal
1
Thanks a ton Broh, you have saved the time and resources of our community.
Reply
networkerinterview.net/entries/vpn/vpn-interview-questions-and-answers 7/9