1. When vetting VPN Product Vendors, what are some of the tougher questions you ask them to qualify their solutions and determine if they are appropriate for your requirements?
2. VPNs have a reputation for solving most, if not all, network security issues. Are there any unreasonable expectations for a VPN or issues it doesn't address?
3. In what scenarios are site-to-site and remote access VPN employed?
4. In your opinion, is a VPN a long-term solution or a short-term stopgap to an immediate security threat?
5. Are there applications or environments in which VPNs may be detrimental and cause more harm than they do good?
6. When deciding whether to use VPN, what items do you consider? What do you then consider when selecting, deploying, and maintaining VPN?
7. What are the reasonable expectations as to what a VPN can do to protect an organization's network and proprietary information?
8. What Is meant by the term "˜Transform Set'?
9. What are the different modes for Secure Sockets Layer Virtual Private Network or SSL VPN?
10. What Is a Cisco Easy VPN, and what are its benefits?
11. What commands do you use to check the status of a VPN tunnel's phases 1 & 2?
12. Can you explain the difference between static crypto maps and dynamic crypto maps?
13. Can you explain DMVPN?
14. What Is Ike, and what communication port does this protocol use?
15. What is a Diffie-Hellman key, and how does it work?
16. Can you explain Next Hop Resolution Protocol (NHRP) and how it is used in VPN?
17. Can you walk me through the steps in an SSL handshake?
18. Are there more than one SSL VPN mode, and if so, can you describe them?
19. Can you define SSL VPN and discuss how it differs from IPsec VPN?
20. What Are Crypto Maps, and how are they used?
21. What Are Security Associations (SA), and how are they used?
22. Can you describe how ISAKMP and IKE protocols work?
23. Can you explain how the two IPsec protocol headers are used in a VPN?
24. Can you explain the differences between transport and tunnel mode data transmission?
25. What are symmetric and asymmetric encryption, and how is each used?
26. Can you discuss the differences between authentication, confidentiality, and integrity in the context of VPNs and network security?
27. What are some of an organization's security vulnerabilities that a VPN will address?
28. What are some of the performance issues raised by the use of a VPN?
29. What are some of the crypto-related best practices recommended in the operation of a VPN?
30. What are some of the firewall issues relevant to the selection and deployment of a VPN?