[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] variance command VDSL (very high data rate DSL) verifying dial backup configuration 2nd IKE (Internet Key Exchange) configuration 2nd IPSec 2nd 3rd 4th IPSec configuration 2nd 3rd 4th versubscription 2nd 3rd 4th very high data rate DSL (VDSL) virtual private dialup network (VPDN) virtual private networks. [See VPNs] voice circuits (ISDN) VPDN (virtual private dialup network) vpdn enable command vpdn-group command VPN (virtual private network) concentrators VPNs (virtual private networks) 2nd . [See also IPSec] 3DES AES (Advanded Encryption Standard) AHs (authentication headers) CA (certificate authorities) CBC (cipher block chaining) CIA (confidentiality, integrity, and authentication) ciphertext client initiated VPNs crypto ACLs (access control lists) 2nd crypto maps 2nd 3rd 4th 5th 6th config-crypto-map command 2nd configuring crypto map command 2nd example cryptosystem D-H (Diffie-Hellman) decryption DES (Data Encryption Standard) ESP (Encapsulating Security Payload) exam prep questions 2nd 3rd 4th 5th 6th extranet VPNs global IPSec lifetimes hashing HMAC-MD5 HMAC-SHA-1 IKE (Internet Key Exchange) enabling/disabling IKEv2 Phase 1 2nd 3rd 4th Phase 2 2nd 3rd policy configuration 2nd preshared keys verifying configuration of 2nd intranet VPNs ISAKMP (Internet Security Association and Key Management Protocol) 2nd 3rd 4th keys key management preshared keys 2nd 3rd network access server initiated VPNs remote access VPNs resources RSA (Rivest, Shamir, and Adleman) digital signatures SA (security association) site-to-site VPNs tennels encrypted tunnels terminating 2nd topologies transform sets 2nd 3rd 4th transport tunnels 2nd 3rd VPN concentrators |