VIRTUAL PRIVATE NETWORKS

  1. Compared to traditional leased lines, the benefits of virtual private networks (VPNs) are lower costs, flexibility, and simplified management.

  2. VPNs provide three critical functions: confidentiality, integrity, and authentication.

  3. Remote access VPNs connect remote users to the enterprise. Remote access clients usually are routers and VPN clients.

  4. Site-to-site VPNs connect entire networks to an enterprise network. They can be built by routers, firewalls, and concentrators.

  5. Diffie-Hellman (D-H) is a public-key cryptography protocol where two parties establish a shared secret key over an insecure communications channel. Group 1 uses 768 bits, and group 2 uses 1024 bits.

  6. Authentication Header (AH) provides data authentication, integrity, and optionally antireplay. It does not work with NAT.

  7. Encapsulating Security Payload (ESP) provides encryption, integrity, and optionally authentication and antireplay. It does work with NAT.

  8. Internet Security Association and Key Management Protocol (ISAKMP) and Internet Key Exchange (IKE) provide authentication of IP Security (IPSec) peers, negotiate IKE and IPSec security associations (SAs), and establish keys for the IPSec encryption algorithms.

  9. Transform set define combinations of IPSec algorithms for encryption and authentication. A transform set describes authentication (such as AH), encryption (such as ESP), and mode (tunnel versus transport).

  10. To configure IPSec, you follow five steps: defining interesting traffic, configuring IKE Phase 1, configuring IKE Phase 2, transferring data, and terminating the connection.

  11. To configure IPSec, you follow four steps: preparing for IKE and IPSec, configuring IKE, configuring IPSec, and testing.



CCNP BCRAN Remote Access Exam Cram 2 (Exam Cram 640 - XXX)
CCNP BCRAN Remote Access Exam Cram 2 (Exam Cram 640 - XXX)
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 183

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net