Secure connectivity using remote access VPNs

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

These questions are derived from the Self Test Software Practice Test for Cisco exam #642-522 – Securing Networks with PIX and ASA.

 

Objective Sequence: Configure a security appliance to provide secure connectivity using remote access VPNs
SubObjective Sequence: Configure WebVPN services: Server/Client

 

Single Answer, Multiple Choice
Which statement is true of the functions url-entry WebVPN configuration mode command?

 

 

  1. This command enables or disables file access.
  2. This command enables or disables user ability to enter names of file servers.
  3. When disabled, the security appliance restricts WebVPN users to the URLs on the home page.
  4. When enabled, the security appliance does not restrict URLs with any configured URL or network ACLs.

 

Answer:
C. When disabled, the security appliance restricts WebVPN users to the URLs on the home page.

 

Tutorial:
When the functions url-entry WebVPN configuration mode command is disabled, the security appliance restricts WebVPN users to the URLs on the home page. The functions url-entry WebVPN configuration mode command is used to enable or disable user entry of URL’s. When enabled, the security appliance restricts URLs with any configured URL or network ACLs.
The complete command syntax for the functionscommand is as follows:
hostname(config-username-webvpn)# functions {file-access | file-browsing | file-entry |
http-proxy | url-entry | mapi | none}
Other options used with the command are explained as follows:

 

 

  • file-access: This options is used to enables or disables file access
  • file-browsing: This option is used to enables or disables browsing for file servers and shares.
  • file-entry: Limits user ability to enter names of file servers.
  • http-proxy: This option allows or disallows the forwarding of an HTTP applet proxy to the client.
  • mapi: Enables or disables Microsoft Outlook/Exchange port forwarding.
  • none: Sets a null value for all WebVPN functions

 

All other options are invalid as they are not the correct explanation for the command option, url-entry.

 

Use the no functions [auto-download | citrix | file-access | file-browsing | file-entry | filter | url-entry | mapi | port-forward] command to remove all configured functions.

 

Reference:
CCSP SNPA Official Exam Certification Guide, Third Edition, Chapter 13, pp. 364-365.

 

http://www.cisco.com/en/US/products/ps6120/products_command_reference_chapter09186a00805fb9df.html#wp1682789

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>