Chapter 13. Securing the Network with VPNs

Terms you'll need to understand:

  • Virtual private network (VPN)

  • Tunnel

  • Transport

  • Encryption

  • Decryption

  • Data Encryption Standard (DES)

  • Triple DES (3DES)

  • Cipher block chaining (CBC)

  • Initialization value (IV)

  • Hashing

  • Hashed Message Authentication Codes Message Digest 5 (HMAC-MD5)

  • HMAC Secure Hash Algorithm 1 (HMAC-SHA-1)

  • Key management

  • Certificate authority (CA)

  • Cryptosystem

  • Diffie-Hellman (D-H)

  • Rivest, Shamir, and Adleman (RSA) digital signatures

  • RSA nonces

  • IP Security (IPSec)

  • Authentication Header (AH)

  • Encapsulating Security Payload (ESP)

  • Internet Key Exchange (IKE)

  • Internet Security Association and Key Management Protocol (ISAKMP)

  • Security association (SA)

  • Transform sets

Techniques you'll need to master:

  • Defining VPN and listing its advantages

  • Describing tunneling and encryption

  • Identifying different VPN scenarios and solutions

  • Describing the components in cryptography

  • Describing the five steps of IPSec

  • Defining AH and ESP

  • Describing how IKE works

  • Describing how an SA is built and used

  • Preparing for IKE and IPSec

  • Configuring IKE

  • Configuring IPSec

  • Testing and verifying IPSec



CCNP BCRAN Remote Access Exam Cram 2 (Exam Cram 640 - XXX)
CCNP BCRAN Remote Access Exam Cram 2 (Exam Cram 640 - XXX)
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 183

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net