1 |
What are some of the main benefits and drawbacks of IPsec remote access VPNs? |
2 |
What are the two main types of issue with regard to IKEv1 an IPsec remote access VPN environment? |
3 |
What are the three main methods by which a VPN gateway can authenticate remote access VPN users when using IKEv1? |
4 |
What sort of functionality can Mode Config provide? |
5 |
What information does the debug crypto isakmp sa command display? |
6 |
What methods do the VPN 3000 concentrator and Cisco ASA 5500 provide to overcome issues with NAT/PAT and IPsec remote access VPNs? |
7 |
When a hardware client (Cisco IOS router) is configured for EZVPN, how does a remote access user authenticate him/herself? |
8 |
What are the three basic ways to configure high availability for IPsec remote access VPNs? |
9 |
To allow IPsec remote access VPN connections through a firewall, which ports may have to be opened on the firewall? |
10 |
What file can be modified to provide auto-initiation of Cisco VPN Client connections with wireless VPNs? |
Designing and Building SSL Remote Access VPNs (WebVPN) |
Part I: Understanding VPN Technology
What Is a Virtual Private Network?
Part II: Site-to-Site VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Advanced MPLS Layer 3 VPN Deployment Considerations
Deploying Site-to-Site IPsec VPNs
Scaling and Optimizing IPsec VPNs
Part III: Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Building SSL Remote Access VPNs (WebVPN)
Part IV: Appendixes
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix B. Answers to Review Questions