SECURITY INTERVIEW QUESTIONS
1. What is Firewall?
Firewall is a software or hardware device. It's security boundary.It prevent unwanted traffic into and out of your computer or network.its perform the following operation:
Packet filtering (ACL).
Routing
and Network Address Translation (NAT).
2. What are the types of Firewall?
Packet filtering (Work in Network Layer).
Application level or Proxy (Works in Application Layer)
Circuit level firewall (works in Session Layer)
Stateful Firewall (Perform all the layers).
3. Stateful Firewall?
Stateful firewall is know as dynamic packet filtering. It's monitor the state of the active connection and use this information to determine which network packets to allow through the firewall.
Static packet filtering only the headers of the packets are checked. Attacker can change the headers and enter in to the network. but dynamic packet filter can analyze packets down to application layer.
4. Difference between PIX and ASA?
PIX:
Dedicated Hardware Firewall.
PIX OS similar to IOS.
GUI Tool PDM that allow secure configuration, Mgmt & Monitoring.
Stateful packet filtering.
Not support web vpn (SSLVPN).
16 MB RAM
ASA:
ASA New Firewall, Anti-malware Security Appliance.
Its include Firewall, IPS (Intrusion Prevention system), Anti-X & VPN
GUI Tool ASDM that allow secure configuration,Mgmt & Monitoring.
Stateful packet filtering.
support web vpn (SSLVPN).
64 MB RAM
5. What is packet filtering?
Packet filtering is a process for protecting a local network form untrusted network.
Network Layer process (Set of rules) the packets are allowed or denied based on the source and destination address, port, or protocol.
6. Explain Trusted Network and Untrusted network?
Trusted Network:
Trusted network computers on trusted network transparently access the files, printer and other resources.. Access of this network define by the local network administrator.
Example : LAN
Untrusted Network:
Opposite of the trusted network. computers on untrusted network control by their owners.
7. PIX or ASA Security Levels?
security Level to find the traffic whether its trusted or untrusted.
Security level - 100 (highest possible) used by inside interface... this level is consider most trusted.
Security level -0 (lowest possible) used by outside interface...this level is consider untrusted.
Security level 1 - 99 you can you any of the interface...
DMZ security level - 50 normally administrator will configure.
typically Security Level inside-100, outside-0 & DMZ-50.
8. What is DMZ?
DMZ - Demilitarized Zone is a physical or logical subnet that contain a organization external-facing service to untrusted network (Internet).
Additional Layer of Security. External users can have only access to the equipment in the DMZ.
Services such as mail server, web server, FTP server and VOIP server (DMZ subnet).
9. What is ip spoofing or spoofed packets? how to prevented?
IP spoofing is a ip address forgery. Hackers entering from untrusted site to trusted site.
hackers find the trusted network ip address and change the packet header and entering in to the trusted sites, IP address indicating that msg is come from trusted network.
Prevent by : Crypto, IP-Sec, VPN & RSA
10.Denial-of-Service? or Distributed Denial-of-Service?
Typical connection, the user sends a msg asking the server to authenticated it. the server returns the authentication approval to the user. The user acknowledges this approval and then is allowed into the server.
In a Denial of service attack, the attacker sends batch of forged authentication request to the server. server can not find the user authentication approval. the server waits some time, server try to close the forged connections, the attacker sends a new batch of forged authentication request. At that time the machine or network resources not available for intended users.
Target - websites , service hosts.
symptoms:
unusual slow network performance
unavailability of particular websites.
11. what is syn flood?
A syn flood is a form of denial-of-service attack in which an attacker sends syn
requests to a target's system in an attempt to consume enough server resources to make the system not available for intended users.
12.What are the commands are using to Troubleshooting IPSEC VPN on ASA?
To see ISAKMP configuration: show run crypto isakmp
To see IP-Sec configuration: show run crypto ipsec
To see crypto map configuration: show run crypto mapTo see IPsec operational data: show crypto ipsec sa
To see ISAKMP operational data: show crypto isakmp sa
Debug commands for VPN tunnels:
To debug isakmp: debug crypto isakmpTo debug ipsec: debug crypto ipsec
To manually clear an ISAKMP or IPSEC SA:
Clear crypto ipsec
Clear crypto isakmp
To clear isakmp or ipsec sa based on ip address or crypto map:
To clear IPsec SA counters: Clear crypto ipsec sa countersTo clear IPsec SAs by entry: Clear IPsec SAs entry ip address
To clear IPsec SAs by map: Clear IPsec SAs map cryptomap _name
To clear IPsec SA by peer: Clear IPsec SA peer ip address
To clear ISAKMP SA by ipaddress : clear crypto Isakmp SA ipaddress
13. How to reset all the tunnels?
Clear crypto Isakmp sa
14. How to reset only one tunnel reset?
clear ipsec sa peer <Address of the other end of the tunnel>
clear ipsec sa peer 202.192.168.12
No comments:
Post a Comment