
Cisco Secure VPN Exam Certification Guide - Cisco press
.pdf
468 Chapter 10: Cisco VPN 3000 LAN-to-LAN with Preshared Keys
6What routing protocol is used for Autodiscovery?
7What is an identity certificate?
8What is the advantage of using SCEP?
9What are critical items when using any certificates?
10Order the steps for using a certificate:
1.Issue an enrollment request.
2.Enroll with the CA.
3.The enrollment request is accepted.
4.Install the certificate.
5.Configure the concentrator to use the certificate.
11You want to use SCEP to enroll an identity certificate. How must the associated CA certificate be obtained?

Q&A 469
12What are the default directory and file name for the DLL used with SCEP?
13What are the three major steps involved in using digital certificates for a LAN-to-LAN connection?
14When using an identity certificate, what is the affect of entering an incorrect name in the OU field?
15What three key sizes may be used with DSA when installing certificates using SCEP?
16What screen is used to configure Network Autodiscovery?
17You have two VPN Concentrators—one in Seattle, the other in London—used for connecting the two offices through VPNs. The Seattle office cannot reach one subnet attached to the London office. You have checked your network lists on the Seattle concentrator. You are sure that the “missing” network is properly configured. What is the most likely problem?

470 Chapter 10: Cisco VPN 3000 LAN-to-LAN with Preshared Keys
18You are using Network Autodiscovery. You do not see a single remote network that is connected through a series of routers to your remote concentrator. Where should your troubleshooting efforts be directed?
19You are using SCEP. Your junior assistant has configured the system. You have established a VPN connection to the remote site, but your remote group does not have access to your network. What is a probable cause?
20You are using SCEP. You are trying to enroll a certificate. Your concentrator shows that it is polling. It has been in this state for over an hour. What is the most likely cause?
21What screen is used to determine the IKE proposal used for a LAN-to-LAN connection?
22What is the purpose of the challenge password on the Administration | Certificate Management | Enroll | Identity Certificate | SCEP screen?
23You wish to use Network Autodiscovery because it sounds easier. How are the networks learned and how do you ensure that only specific networks are included?

Q&A 471
24What are the differences between a root certificate, a subordinate certificate, and an identity certificate?
25What are the maximum numbers of certificates that may be used on concentrators?


C H A P T E R 11
Scenarios
The following scenarios and questions are designed to draw together the content of the book and exercise your understanding of the concepts. There might be more than one correct answer. The thought process and practice in manipulating each concept in the scenario are the goals of this chapter.
Example Corporation
The Value-Packed Nutrition Corporation has a growing VPN infrastructure, as shown in Figure 11-1. The scenarios in this chapter are based on the elements shown in this diagram.
Figure 11-1 Value-Packed Nutrition Corporation
|
|
Portland |
|
|
|
|
|
|
|
User |
User |
User |
User |
Printer |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Detroit |
|
|
|
|
|
|
|
|
|
Bastion |
Access |
|
|
|
|
|
|
|
|
Server |
||
|
|
|
|
|
|
|
Router |
||
|
|
|
|
|
|
|
|
||
|
|
|
|
|
Internet |
|
|
|
|
|
VPN 3002 |
DSL Modem |
|
|
|
|
VPN |
||
|
|
|
|
|
|
|
DMZ |
||
|
|
|
|
|
|
Firewall |
3030 |
||
|
|
|
|
|
|
Switch |
|||
|
|
|
|
|
|
|
|
||
VPN 3002 |
|
|
|
|
|
|
|
|
|
|
|
|
DSL Modem |
|
|
|
|
|
|
User |
User |
User |
User |
Printer |
|
|
Internet |
|
|
|
|
Seattle |
|
|
|
|
Intranet |
||
|
|
|
|
|
|
Server |
Server |
||
|
|
|
|
|
|
|
|||
|
|
|
|
Terry |
|
Private |
|
|
|
|
|
|
|
|
Network |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Carol |
|
Internal |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
VPN |
VPN |
LAN |
|
|
NT |
|
|
|
|
|
|
|
DC |
||
|
|
|
|
3005 |
3005 |
CA |
|
|
|
|
|
|
|
WINS |
DNS |
DHCP |
|||
|
|
|
|
|
|
||||
|
|
|
|
Memphis |
Richmond |
Server |
|
|
|
|
|
|
|
|
|
|
|




Scenario 11-6— Terry and Carol 477
Scenario 11-5—Richmond
Configure the Detroit and Richmond VPN concentrators to support the Richmond users.
Scenario 11-6—Terry and Carol
Configure the Detroit VPN concentrator and Terry and Carol’s VPN Client to provide the required access.