1 |
IPsec consists of what elements? |
2 |
What services does IPsec provide to IP? |
3 |
What are the main characteristics of symmetric encryption algorithms? |
4 |
What are the two types of symmetric encryption algorithms? |
5 |
What are the characteristics of public key algorithms? |
6 |
What security services do AH and ESP provide? |
7 |
What is an IPsec security association (SA)? |
8 |
What is the function of IKE? |
9 |
What are some common considerations when selecting parameters for IPsec transform sets? |
Part I: Understanding VPN Technology
What Is a Virtual Private Network?
Part II: Site-to-Site VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Advanced MPLS Layer 3 VPN Deployment Considerations
Deploying Site-to-Site IPsec VPNs
Scaling and Optimizing IPsec VPNs
Part III: Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Building SSL Remote Access VPNs (WebVPN)
Part IV: Appendixes
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix B. Answers to Review Questions