Tuesday, October 22, 2013

Interview Questions

1. What is the difference between the ASA firewall operating in Routed Mode and Transparent Mode ?
    Ans  :  A firewall in a routed mode is a routed hop and acts as a default gateway for hosts that connect to one of its screened subnets. . A transparent firewall, on the other hand, is a Layer 2 firewall that acts like a "bump in the wire," or a "stealth firewall," and is not seen as a router hop to connected devices.


2. How to control ARP Traffic in Transparent mode of ASA Firewall ? 
    Ans :  ARP Inspection is used to control ARP Traffic

3.  What is mean by Stealth Firewall ?
Ans  :

4.  What are called Non-IP Traffic?
Ans : AppleTalk, IPX, BPDUs, and MPLS

5. What happen when you change the mode of firewall from Routed to Transparent ?
Ans : When you change modes, the adaptive security appliance clears the configuration because many commands are not supported in both modes.

6. what are the different types of NAT supported by ASA ?
Ans :  i. Static NAT
         ii. Dynamic NAT
        iii. Static PAT
        iv. Dynamic PAT
         v. Identity NAT
        vi. Static Identity NAT
       vii. NAT Exemption
  
7. What is mean by Load Balancing?
In firewall, load balancing means the two firewall are configured in such a way that both the firewall will process the client request based on specific algorithm ( such as Round Robin Algorithm ) 

8. What is the use of VPN ?
       VPN is used to create a seperate tunnel between two users to have a secure connection which means the data is encapsulated before sending.

9.  What is the use of Proxy ARP ?
 Ans :  Proxy ARP feature will enable the device to answer the ARP queries for the network address that is not on that network

10. What is mean by Policy Based NAT?

11. Can you explain about OSI Model ?
   Ans :  OSI model is develpoped to have a common reference model for communication between devices of different vendors. It consists of seven layers 
       The bottom layer in OSI model is  ''Physical Layer '' which is responsible for forming a physical interfaces between devices which allows for transmission of data in raw bit stream.
       The second bottom layer is " Data Link Layer"  which is responsible for


12. What do you mean by Access List?
  Ans :  Routers ,Cisco ASA firewall provide traffic filtering capabilities using the access-list . Access list consists of ACE ( Access Control Entries ). An ACE is a single entry which permits or deny based on Protocol , Source and Destination address and can also be used source and destination port numbers

Cisco ASA supports mant Access list types
1.  Standard Access List
2.  Extendd Access List
3.  Ethertype Access List
4.  Web based Access List
5.  IPv6 Access List

13.  Differnce between TCP and UDP


TCP
UDP
Acronym for:
Transmission Control Protocol
User Datagram Protocol or Universal Datagram Protocol
Function:
As a message makes its way across the internet from one computer to another. This is connection based.
UDP is also a protocol used in message transport or transfer. This is not connection based which means that one program can send a load of packets to another and that would be the end of the relationship.
Usage:
TCP is used in case of non-time critical applications.
UDP is used for games or applications that require fast transmission of data. UDP's stateless nature is also useful for servers that answer small queries from huge numbers of clients.
Examples:
HTTP, HTTPs, FTP, SMTP Telnet etc...
DNS, DHCP, TFTP, SNMP, RIP, VOIP etc...
Ordering of data packets:
TCP rearranges data packets in the order specified.
UDP has no inherent order as all packets are independent of each other. If ordering is required, it has to be managed by the application layer.
Speed of transfer:
The speed for TCP is slower than UDP.
UDP is faster because there is no error-checking for packets.
Reliability:
There is absolute guarantee that the data transferred remains intact and arrives in the same order in which it was sent.
There is no guarantee that the messages or packets sent would reach at all.
Header Size:
TCP header size is 20 bytes
UDP Header size is 8 bytes.
Common Header Fields:
Source port, Destination port, Check Sum
Source port, Destination port, Check Sum
Streaming of data:
Data is read as a byte stream, no distinguishing indications are transmitted to signal message (segment) boundaries.
Packets are sent individually and are checked for integrity only if they arrive. Packets have definite boundaries which are honored upon receipt, meaning a read operation at the receiver socket will yield an entire message as it was originally sent.
Weight:
TCP requires three packets to set up a socket connection, before any user data can be sent. TCP handles reliability and congestion control.
UDP is lightweight. There is no ordering of messages, no tracking connections, etc. It is a small transport layer designed on top of IP.
Data Flow Control:
TCP does Flow Control. TCP requires three packets to set up a socket connection, before any user data can be sent. TCP handles reliability and congestion control.
UDP does not have an option for flow control
Error Checking:
TCP does error checking
UDP does error checking, but no recovery options.
Fields:
1. Sequence Number, 2. AcK number, 3. Data offset, 4. Reserved, 5. Control bit, 6. Window, 7. Urgent Pointer 8. Options, 9. Padding, 10. Check Sum, 11. Source port, 12. Destination port
1. Length, 2. Source port, 3. Destination port, 4. Check Sum
Acknowledgement:
Acknowledgement segments
No Acknowledgment
Connection:
TCP is a connection-oriented protocol.
UDP is a connectionless protoc