Chapter 12. IPSec and Virtual Private Networks


Terms you'll need to understand:

  • ISAKMP policies

  • Internet Key Exchange (IKE)

  • Internet Protocol Security (IPSec)

  • Authentication header (AH)

  • Encapsulation security payload (ESP)

  • Transform sets

  • Crypto maps

  • IP local pool

  • Security association

Techniques you'll need to master:

  • Four steps to setting up IPSec

  • ISAKMP policies

  • Transform sets

  • Crypto maps

Before the innovation of virtual private networks (VPNs), companies had no choice but to purchase expensive wide area network (WAN) connections to interlink sites or allow users access into their networks. These days, companies and home users alike can use VPNs to access network resources ”not by traveling across dedicated WAN links, but by using public media such as the Internet. This chapter contains a high-level overview of VPN technology and discusses VPN functionality provided by the PIX firewall.



CSPFA Exam Cram 2 (Exam 642-521)
CCSP CSPFA Exam Cram 2 (Exam Cram 642-521)
ISBN: 0789730235
EAN: 2147483647
Year: 2003
Pages: 218

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net