VPN multiple choice exam
http://compnetworking.about.com/od/vpn/l/aa012101a.htm
A Virtual Private Network (VPN) uses advanced encryption and
tunneling to establish secure, private network connections over
"third-party" networks. Using the Cisco VPN Client
will allow the University of Michigan community to access the
University network via the Internet over a secure, encrypted connection
from their machines.
Does using a VPN make all of my network traffic secure?
No. The VPN only adds security to traffic that goes over the tunnel.
If using the wireless profile, it encrypts the traffic from your
computer to the VPN concentrator located on the UMnet Backbone. If you
use the Cisco VPN Client from off-campus, only the traffic from your
computer to U-M resources located on the UMnet Backbone is encrypted. All traffic to non U-M sites is sent in the clear.
To ensure that all of your network traffic is secure (including your password) once it hits the Internet, you should always use encrypted protocols such as SSH, SFTP, SCP, and SSL.
There are two profiles provided for U-M faculty, staff, students and sponsored affiliates: UMVPN - All Traffic and UMVPN - Only U-M Traffic. Both of these profiles are treated as an on-campus U-M network:
To ensure that all of your network traffic is secure (including your password) once it hits the Internet, you should always use encrypted protocols such as SSH, SFTP, SCP, and SSL.
Services such as Microsoft Exchange and Windows file sharing are not always available to off-campus computers, without a U-M
IP address. Typically, the users affected are those who are connecting
from home, using a commercial Internet Service Provider (ISP).
In order to be able to use services like Exchange from home, you must use a Virtual Private Network (VPN) client. Connecting with the Cisco VPN Client will give you a U-M IP address so that you may access these services.
In order to be able to use services like Exchange from home, you must use a Virtual Private Network (VPN) client. Connecting with the Cisco VPN Client will give you a U-M IP address so that you may access these services.
- UMVPN - All Traffic — All traffic, no matter the destination, is sent over the encrypted tunnel to the VPN server on the UMnet Backbone.
- UMVPN - Only U-M Traffic — Only traffic that is destined for a resource on the UMnet Backbone is sent over the VPN tunnel. All other traffic is sent out your network connection as normal.
- UMVPN - Alumni-Retiree — All traffic, no matter the destination, is sent over the encrypted tunnel to the VPN server on the UMnet Backbone.
Connecting with the UMVPN - All Traffic, UMVPN - Only U-M Traffic or UMVPN - All Traffic will give you a U-M
IP address so that you may access many University services. The IP
address assigned will be between 141.213.168.10-141.213.175.255. If you
want to create a rule on a local machine to either deny or allow access
from this range you should use the network of 141.213.168.0/21
Connecting with the UMVPN - Alumni-Retiree profile will provide a secure connection to the UMnet Backbone but the connection will be treated like a non-UM network. Access to some U-M resources such as Library journals is not available. The IP address assigned will be in the 35.xx.xx.xx. pool.
Connecting with the UMVPN - Alumni-Retiree profile will provide a secure connection to the UMnet Backbone but the connection will be treated like a non-UM network. Access to some U-M resources such as Library journals is not available. The IP address assigned will be in the 35.xx.xx.xx. pool.
The newest version of the Cisco VPN Client
is available from this website. If you are running an older version of
the client, it is recommended that you upgrade to this version. Many
issues have been resolved with this new version; see the Cisco Release Notes for VPN Client for more information.
To upgrade your Cisco VPN Client in Windows, you will first need to manually uninstall the old version of the client:
To upgrade your Cisco VPN Client in Windows, you will first need to manually uninstall the old version of the client:
- From the Start menu, select Settings > Control Panel > Add or Remove Programs.
- Select VPN Client from the program list, and click the Change/Remove button.
- When it asks if you want to completely remove the Cisco VPN Client, including Profiles and Certificates, click OK.
- You will be asked to reboot your machine. Click OK.
- After your machine boots up, download the newest version of the Cisco VPN Client from this site, and install it.
Importing a profile into the Cisco VPN Client is quick and easy. For Windows and Mac OS X, simply follow these steps:
In Linux:
- Download a copy of the new profile to your desktop.
- Start the Cisco VPN Client and click the Import button.
- Browse to your desktop, select the new profile that you just downloaded, and click OK.
In Linux:
- Change directories to /etc/CiscoVPNClient and create a Profiles directory.
- Copy the {profile}.pcf file into the Profiles directory.
Using older versions of the Cisco VPN client is not usually
recommended. However, there may be some situations in which a user may
need to downgrade to a previous version. We recommend you contact the ITS Service Center (4-HELP) for assistance before downgrading the VPN client on your machine.
I
installed the Cisco VPN Client successfully, and it appears I have a
network connection, but I cannot connect to sites on the Internet. Why
is this happening?
There are a few ways to troubleshoot this problem. In the majority of
cases, though, the issue is having old or outdated drivers installed
for your network card. Updating the drivers for your network card will
usually resolve the connection problem.
To obtain the newest drivers, search the website of the company that makes your network card. Manufacturers often post updated drivers on their sites for free download. Another tip is to execute a search on your favorite search engine. A typical search would include the make and model/number of your card, as well as the word drivers. For example: Cisco Aironet 340 drivers
After you download the drivers, it is quite simple to update them. For example, in Windows, follow these steps:
If the problem persists after completing all of the troubleshooting steps described above, please call the ITS Service Center (4-HELP) and a staff member will help troubleshoot your problem further.
To obtain the newest drivers, search the website of the company that makes your network card. Manufacturers often post updated drivers on their sites for free download. Another tip is to execute a search on your favorite search engine. A typical search would include the make and model/number of your card, as well as the word drivers. For example: Cisco Aironet 340 drivers
After you download the drivers, it is quite simple to update them. For example, in Windows, follow these steps:
- Right-click on My Computer and select Properties.
- Click the Hardware tab.
- Click the Device Manager button.
- Find your network card under the Network adapters section of the hardware list, and double click its icon.
Note: If the drivers for your network card have not been properly installed at all, you will find your network card listed under the Other devices section (shown next to a big, yellow question mark ). - In the resulting window, click the Driver tab.
- Look at the Driver Date and Driver Version, and make sure the drivers you downloaded from the manufacturer's site are newer. If so, click the Update Driver button.
- The Hardware Update Wizard will appear. Click the button next to Install from a list or specific location (Advanced), and click Next.
- Click the Browse button to find the folder on your Desktop that contains the updated drivers you downloaded, and click Next.
- The Wizard will update your drivers automatically. You will need to reboot your computer when the Wizard completes.
If the problem persists after completing all of the troubleshooting steps described above, please call the ITS Service Center (4-HELP) and a staff member will help troubleshoot your problem further.
After you authenticate to the VPN server, there will be a bright
yellow padlock icon appearing in the System Tray (lower-right corner)
next to your clock. If the lock icon appears "locked," it means you are
authenticated. If the lock icon appears "unlocked," it means that you
are not authenticated and are not connected to the Internet.
To see the status of your VPN connection, right-click on the padlock and select Statistics. This will give you the status of your connection, as well as the option to disconnect.
If the Cisco VPN Client is not running, the padlock will not appear in the system tray.
To see the status of your VPN connection, right-click on the padlock and select Statistics. This will give you the status of your connection, as well as the option to disconnect.
If the Cisco VPN Client is not running, the padlock will not appear in the system tray.
What is Trusted and Untrusted Networks?
Trusted networks: Such Networks allow data to be transferred transparently. The machines using a trusted network are usually administered by an Administrator to ensure that private and secured data is not leaked. Access to this network is limited. Computers using trusted networks are more secured and confidential because of strong firewalls.Untrusted networks: Such networks are usually administered by the owners. They can allow improper access to sensitive or personal data. These machines are usually separate. Such machines could me more prone to attacks
What is the Cisco Systems VPN Adapter?
The VPN Adapter is a "software-only" driver that provides an
interface to solve protocol incompatibility problems. With this
installed, more applications are able to run while connected with the
Cisco VPN Client. Removing this adapter from your Network Connections
Control Panel may cause the Cisco VPN Client to stop working properly.
See the Cisco Release Notes for VPN Client for more information on the VPN Adapter.
See the Cisco Release Notes for VPN Client for more information on the VPN Adapter.
What are the different types of VPN?
- Remote Access VPN:- Also called as Virtual Private dial-up network (VPDN) is mainly used in scenarios where remote access to a network becomes essential. Remote access VPN allows data to be accessed between a company’s private network and remote users through a third party service provider; Enterprise service provider. E.g Sales team is usually present over the globe. Using Remote access VPN, the sales updates can be made.
- Site to Site VPN – Intranet based: This type of VPN can be used when multiple Remote locations are present and can be made to join to a single network. Machines present on these remote locations work as if they are working on a single network.
- Site to Site VPN – Extranet based: This type of VPN can be used when several different companies need to work in a shared environment. E.g. Distributors and service companies. This network is more manageable and reliable.
What are the different authentication methods used in VPNs?
The authentication method uses an authentication protocol. The methods are:- EAP authentication method: Extensible authentication protocol authenticates remote access connection. The authentication mechanism is decided between the remote VPN client and authenticator (ISA). The mechanism is typical in which authenticator requests for authentication information and the responses are given by the remote VPN client.
- MS Chap Authentication method: Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) starts with the authenticator (Remote access server) challenge. The challenge to the remote access client sends a session identifier and challenge string. The client in response sends the nonreversible encryption of the string, the identifier and password. Authenticator checks the credentials and grants access on a successful authentication.
- Unencrypted passwords (PAP):- Uses plain text passwords. Does not involve encryption. Used for less secure clients.
- Shiva Password Authentication Protocol (SPAP):- It is a password authentication protocol. It is less secure as the same user password is always sent in the same reversibly encrypted form
No comments:
Post a Comment