D



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [V] [W] [X]

data authentication,
data confidentiality,
     in VPDN deployments
data integrity, 2nd
decryption,
deployment models
     hub-and-spoke VPNs
         clustered spoke design,
         redundant clustered spoke design,
     IPsec+GRE
         sample configurations,
         tunnel establishment, verifying,
     RAVPNs
         clients,
         clustered VPN concentrator designs,
         standalone VPN concentrator designs,
     site-to-site VPNs
         configuring,
         over routed domain,
         verifying configuration,
DES (data encryption standard),
Diffie, Whitfield,
Diffie-Hellman
     key exchange
     secret key generation 2nd
DiffServ, impact of IPsec on,
digital signatures, generating,
distribute lists,
DMVPNs (Dynamic Multipoint VPNs), 2nd
     geographic HA, configuring
DNS server load balancing,
     in RAVPNs with geographic HA
DPD (Dead Peer Detection),
     peer availability
dual-DMZ tunnel termination, 2nd
dynamic crypto maps,
     and RRI
     applying in SOHO environments
     configuring
     impact on ISAKMP/IKE
     impact on VPN behavior
     routing considerations
     security considerations
         key administration and scalability,
         unrestricted peering and traffic flows,
     TED
     verifying




IPsec Virtual Private Network Fundamentals
IPSec Virtual Private Network Fundamentals
ISBN: 1587052075
EAN: 2147483647
Year: N/A
Pages: 113

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net