End of Chapter Solutions Template

advertisement
Guide to Firewalls and Network Security
Chapter 9 Solutions
Review Questions
1.
What do VPNs do that firewalls cannot do?
Answer: C. The other answers are all functions that firewalls can perform whether or not they also
help establish a VPN.
2.
Which of the following is a limitation of using leased lines to set up a private network?
Answer: D
3.
Which of the following is a limitation of using a VPN rather than a leased line?
Answer: C. VPNs can be unreliable because they rely on the public Internet, and if part of that Internet
that helps create the VPN goes down, the VPN becomes unusable.
4.
Why would you choose a VPN that is built into a firewall rather than a VPN appliance or a router?
(Choose all that apply.)
Answer: A, B, D. Hardware appliance VPNs can be just as secure as firewall-based VPNs. But a
firewall that you have already configured makes it relatively convenient to set up a VPN.
5.
Why is it particularly easy to set up a VPN with Check Point FireWall-1?
Answer: B. It’s true that FireWall-1 can perform encryption and authentication but these are not
reasons why it’s easier to set up a VPN with the product.
6.
Why is the term tunnel misleading?
Answer: It implies that there is a single dedicated cable linking one computer or network to another,
but in reality, the VPN uses the public Internet to join the two networks. The “privacy” in VPN comes
from encryption, encapsulation, and authentication.
7.
Which of the following is a downside of using a proprietary VPN protocol such as FWZ?
Answer: A. FWZ provides for 40-bit encryption which, while lower than other methods, is still a
relatively strong level of encryption.
8.
Why is authentication an essential part of a VPN? (Choose all that apply.)
Answer: B, C
9.
How are the participants in a VPN actually authenticated?
Answer: C
10. Which of the following protocols does not provide for client-to-site authentication on its own?
Answer: D
11. Which of the following is a benefit of setting up a VPN rather than a leased line? (Choose all that
apply.)
Answer: B, C, D. VPNs are actually less reliable than leased lines, but they are faster and less
expensive.
12. Which of the following is a special consideration you need to take into account when setting up
multinational VPN?
Answer: A. While it’s true that different electrical systems are used in some countries, this doesn’t
affect the operation of the VPN specifically.
Guide to Firewalls and Network Security
Chapter 9 Solutions
13. Why would you consider purchasing a VPN appliance rather than installing less expensive VPN
software? (Choose all that apply.)
Answer: B, D
14. Aside from the fact that they’re less expensive, under what circumstances does using a software VPN
give you an advantage over a VPN appliance?
Answer: D. Software VPNs scale well with fast-growing companies.
15. Finish this sentence: A record that a VPN terminator checks to see if a security association exists is
called a _______...
Answer: C
16. A mesh VPN configuration is ideal in what situation?
Answer: A. It would be advantageous if all participants used the same ISP because this would speed
communications, but it’s not relevant in choosing a VPN configuration.
17. A hub-and-spoke VPN configuration is ideal in what situation? (Choose all that apply.)
Answer: B, C. A is incorrect because a mesh configuration tends to operate more quickly than a huband-spoke configuration, where all communications have to pass through a single node.
18. What is the VPN protocol most widely used today?
Answer: D. IPSec provides powerful encryption and authentication and is an Internet standard
supported by many software and hardware manufacturers.
19. Tunnel mode seems like the obvious choice in using IPSec to secure communications through a VPN
tunnel; what’s the potential drawback with it?
Answer: B
20. PPTP is an older VPN protocol that is mainly used when older client computers, but it has one
advantage over the more recent L2TP. What is it?
Answer: D. PPTP is used to link remote users to networks, not sites to sites. In addition, L2TP is
compatible with firewalls and packet filters.
Hands-on Projects
Project 1
n/a
Project 2
n/a
Project 3
n/a
Project 4
n/a
Project 5
n/a
Project 6
The secret, because it is used for authentication, should have the properties of a good password: it should
be relatively short (perhaps 7-9 characters), contain a mixture of numerals and characters, is relatively easy
to remember, and not written down where others can discover it.
Guide to Firewalls and Network Security
Chapter 9 Solutions
Project 7
n/a
Case Projects
Case Project 1
Since all offices need to participate in the VPN and you have a small VPN to begin with, you should
probably convert all offices that need to participate in the VPN to a hub-and-spoke configuration.
Alternatively, you could keep the existing mesh configuration for the local offices and use a hub-and-spoke
arrangement for the overseas ones.
Case Project 2
The easiest way to expand the network would be to simply add another spoke to the hub and extend it to the
distribution center. However, because speed is of the essence you should probably set up a separate mesh
configuration linking the central office, the branch office, and the distribution center.
Case Project 3
One alternative would be to check the Asian company’s ISP connection. Go to the ISP’s Web site, and email the branch office’s network administrator, in order to determine if the network has been running
slowly or if there have been a significant number of slowdowns. If there have, you should recommend that
a new ISP be found—preferably one that is already being used by other offices in the VPN. Another
alternative is to increase the bandwidth available to the central VPN router, which is responsible for
directing traffic to and from the overseas branch offices.
Case Project 4
The probable cause is the use of transport method, which encrypts and decrypts packets outside the packet
filters at the perimeter of the two LANs. Packets pass through the packet filter in encrypted form, so that
their contents are not filtered. Switching to tunnel mode would cause packets to be encrypted and decrypted
inside the packet filtering perimeter which would reduce the chances that corrupted packets could be
allowed into the second LAN.
Guide to Firewalls and Network Security
Chapter 9 Solutions
Download