Term
What are the two methods for security access? What component provides the VPN technology? Which method is the best for vpn and why? |
|
Definition
- SSL and IPSec
- Network Connect provides the VPN technology
- IPSec is the preferred method because it was built to support multiple protocols. SSL can only be used to tunnel between one client and the network and is not suppported for site to site vpns
|
|
|
Term
What features does the TLS handshake protocol provide. What does the TLS record protocol provide. |
|
Definition
The Transport Layer Security Protocol provides the following features: - Peer Identity verification
- Uses public/private key cryptology
- Standard Key negotiation
The TLS record protocol provides:
- Privacy via symmetric encryption (DES, RCA
- Keys generated during the TLS handshake
- Reliability via HMAC mechanisms (SHA, MD5)
|
|
|
Term
Briefly describe the Juniper SPG. |
|
Definition
- SPG = Secure Products Group
- Market Leader since aquisition of NetScreen
- Unique because they seek out security reviews of the IVE (Instant Virtual Extranet) Platform
- Market Leader because of their purpose built application security gateway
|
|
|
Term
What is the corporate reason SSL VPN's are preferable over IP Sec VPNs? |
|
Definition
IP Sec VPNs were costly and hard to set up |
|
|
Term
Define IPSec and describe it's use in VPNs. What is the most significant difference between IPSec and SSL for VPNs. |
|
Definition
- Network layer protocol implemented to provide secure channels across the internet
- Designed to carry any IP traffic from many users through a single tunnel.
- It is highly efficient and requires less network overhead than SSL
- SSL can only be used to tunnel between a single user and a server
|
|
|
Term
Describe the difference between symmetric and asymmetric encryption. |
|
Definition
- Symmetric encryption uses the same key to encode and decode the data.
- Asymmetric encryption uses a pair of keys (Public and Private) to encode and decode the data.
|
|
|
Term
Describe how SSL sets up a secure session. |
|
Definition
- Client requests the channel through https: prefix.
- Server transfers it's x.509 certificate containing it's public key
- The client uses the public key to encrypt a symmetric key which will be used for the remainter of the session
|
|
|
Term
Describe the process of setting up an IPSec connection. |
|
Definition
- Uses Internet Key Exchange (IKE). IKE uses two phases.
- Phase I
- Uses UDP port 500
- An X.509 certificate is used, or a pre-shared key
- Diff-Helman (asymmetric) is used to transfer the information
- Phase II
- Exchange of information about what networks will communicate over the tunnel
- No equivalent in SSL
|
|
|
Term
Identify the most commonly used standards for asymmetric and symmetric encryption in SSL. |
|
Definition
- RSA is used for asymmetric.
- 3DES or AES is used for symmetric
|
|
|
Term
What is X.509 and what information does the protocol transfer. |
|
Definition
- X.509 is a standard which defines how asymmetric keys should be packaged
- Public Key
- Key owner
- Expiration date
- Name of organization which issued the key
- Allowable uses of the key
- Digital signature enabling the client to verify key and certificate holder integrity
|
|
|
Term
Identify the two IVE product families Juniper offers and list the products in each. Identify the major difference between the product families. |
|
Definition
|
|
Term
Describe the NetScreen Secure Access Product Line |
|
Definition
Targeted to small to medium (1000), medium to large (3000), and large enterprises (5000) Offers scalability options and provides headroom for user growth and application complexity Offers High Availability Clustering Options with Stateful System Peering, Active/Passive, and Active/Active configurations Replication provides for Multi-Site clusters and high user volume
|
|
|
Term
Describe the feature set of the Secure Access Product Line 700, 2000, 4000, 6000 |
|
Definition
SA 700 (Small Medium Enterprises) SA 2000 (Medium Enterprise) SA 4000 (Medium - Large Enterprise) SA 6000 (Large Global Enterprise)
|
|
|
Term
|
Definition
|
|
Term
What is FIPS? Which products comply with FIPS certification? |
|
Definition
|
|
Term
Broadly categorize the security strengths of the IVE. |
|
Definition
|
|
Term
Describe the security features of the IVE platform design. |
|
Definition
The file system is encrypted using AES O/S has been hardened - additional network services have been removed. Services are specialized services and not vulnerable to common vulnerabilities Access to the OS has been restricted by the User Interface Certification by trusted industry organizations
|
|
|
Term
Describe the Host Checker and the remediation actions that can be taken. What functionality does the Host Checker API provide? |
|
Definition
The Host Checker provides the ability to examine processes, services, and files on the client computer and use that information to determine how the intranet is accessed. Remediation Actions include: Redirection of the user to a custom page describing how to fix the problem Evaluation of an alternate policy Killing a process or deleting a file on the client system
|
|
|
Term
What are the components of the Juniper Endpoint Defense Initiative? |
|
Definition
Cache Cleaner Host Checker (Native Host Check) Host Checker Client Interface (Host Checker API) Host Checker Server Integration Interface
|
|
|
Term
Describe the functionality of the Cache Cleaner. |
|
Definition
|
|
Term
Describe the Host Check Server Integration Interface. |
|
Definition
API allowing integration of a JEDI compliant system with the IVE Prompt Host Checker to run third party software on the client Host Integrity Scans Malware detectors
Specify with granularity what the Host Checker should do based on results. You can dynamically map users based on policies to:
|
|
|
Term
Which trusted industry organizations certify the IVE platform? What industry security certifications does Juniper hold? |
|
Definition
iSec Partners Cybertrust TruSecure
|
|
|
Term
|
Definition
Provided through the browser Provides access to all internal web sites and applications which provide web interfaces, including OWA Internal resources are never accessed directly by the client Allows most detailed level of auditing and logging of any access method Can be used to present file shares, telnet sessions, and terminal services Supports complex Java, JavaScript, and Flash
|
|
|
Term
|
Definition
Captures only certain application traffic based and forwards it to the IVE. Suffers from less sophisticated logging than Core Access, but is more granular than Network Connect. Deployed with Java Secure Application Manager JSAM or with Active X Secure Application Manager WSAM. JSAM forwards traffic based on TCP port, and WSAM forwards traffic based on the application executable. JSAM needs access to the hosts table. On NTFS, this requires administrative access. On Linux, this requires root level access. Does not support applications in which the server initiates the communication.
|
|
|
Term
Describe Network Connect. |
|
Definition
Creates a Virtual Network Adapter with an IP Address from the internal network. Attempts to use IPSec, then fails back to SSL Can be integrated with the Graphical Identification and Authorization (GINA) module in Windows, allowing the user to log into the corporate network at the same time they log into Windows Can be deployed with Java or Active X, supporting Windows, Linux, and Mac Suffers from the least amount of logging (none) compared to SAM and Core Access
|
|
|
Term
Identify the 5 types of authentication which the IVE products support. |
|
Definition
|
|
Term
Define Authorization and describe how realms are related to the authorization process. |
|
Definition
Specifies what actions a user can perform Is based on some aspect of the user Realms provide associations to authentication servers, user roles, and pre-authentication options.
|
|
|
Term
What are the three types of Authentication? |
|
Definition
Pre-Authentication User Roles Resource Policies
|
|
|
Term
Define Pre-Authentication. What are the qualifications which fall under pre-authentication? |
|
Definition
|
|
Term
How do user roles define what the user will have access to? |
|
Definition
Whether the user will have access to JSAM, WSAM, or NC. Controls the settings of Core Access Define applications for SAM, and the NC address Are defined as separate objects and not part of a Realm
|
|
|
Term
What is the difference between roles and resource policies? |
|
Definition
|
|
Term
Define the authorization flow of the IVE objects. |
|
Definition
User attempts to acess the IVE URL Pre-authentication authorization rules are checked to see which realms are available to the user User is presented with a login page based on which realms are available to the user User is authenticated, then mapped to roles defined in the realm. This determines the final window presented to the user. Whenever the user tries to access a resource, the corresponding resource policy is checked for appropriate access.
|
|
|
Term
How can users be mapped to roles? |
|
Definition
|
|
Term
What interface is supported for initial configuration of the IVE? What are it's settings? |
|
Definition
Menu driven setup over serial console and terminal emulation software 9600 baud, 8 data bits, 1 stop bit, and no flow control
|
|
|
Term
List the settings which are configured during the initial configuration. |
|
Definition
|
|
Term
How is the administrator web site accessed? What is special about the administrator page? |
|
Definition
Access is available over http, located at the IP Address of the IVE, and the word admin is located in the URL There is a note on the screen which confirms the administrator login page
|
|
|
Term
List the steps required to add a new Active Directory or Windows NT authentication server. Can this server be used for authorization? |
|
Definition
Select "Signing in" from the left navigation bar Select "Active Directory/ Windows NT" from the server type selection box. Type in the addresses of the two domain controllers and the name of the domain. The servers can not be used for authorization without defining an LDAP server.
|
|
|
Term
Up to how many LDAP servers can be used for Authentication/Authorization? What are the appropriate settings to use for Active Directory? |
|
Definition
Three Specify the "Admin DN" as "cn=Administrator,cn=Users, dc=domain, dc=com", and type in the password Under "Finding user entries" Under "Determining group membership" Use the root of the domain as the "Base DN" Set the "Filter" to "CN=<GROUPNAME>" Set the "Member Attribute" to "member"
|
|
|
Term
What is the function of the Realm? |
|
Definition
|
|
Term
How is a new realm created? What must be done after the realm is created? |
|
Definition
|
|
Term
List the competetive weaknesses of the Aventail product line |
|
Definition
Immature appliance due to it's non hardened use of the Linux OS and software - susceptible to Apache based attacks. Web file access has PHP3 bugs Difficult to deploy, use, and manage Aventail Connect uses win32 SOCKS5 client and requires installation and reboot on each PC. No support for Windows Authentication such as Kerberos or NTLM Provide standard web access - use an Active X port forwarder requiring admin rights on Windows.
|
|
|
Term
List the competetive weaknesses of the Cisco product line. |
|
Definition
Performance problems supporting 100 concurrent users on any model, and mixed mode IPSec SSL supports maximum of 50 users Low end hardware platforms - VPN 3000 Series Can take days to weeks to set up No Java rewriting, little JavaScript support, no VBScript, no Flash support No WSAM equivalent, no "true" application support, and no MD5 app checking No features like NC and cannnot support UDP/ICMP
|
|
|
Term
List the competetive weaknesses of F5's security line. |
|
Definition
Strength lies in load balancing and traffic management Many holes in security exist including Apache, weak endpoint security and built in virtual desktop with many known exploits. Management, granular control, and network configuration changes are limited. Performance problems with high performance applications such as VoIP.
|
|
|
Term
List the competetive weaknesses of Citrix's product line. |
|
Definition
Server based computing company recently entering security market with acquisitions of Net6 in late 2004 and NetScalar in mid 2005. Weaker access options, poor endpoint security, poor management
|
|
|
Term
List the competetive weaknesses of the Nortel product line |
|
Definition
Entered the market after aquisition of Alteon in 2003 Core market is service providers Strength is GUI flexibility
|
|
|