1 |
How many versions of SSL are there, and which can be implemented on Cisco equipment? |
2 |
What are some of the main advantages and disadvantages of SSL remote access VPNs? |
3 |
What type of protocol is SSL transported over? |
4 |
What protocols does SSL consist of? |
5 |
What are the functions of the record protocol? |
6 |
What software is required on client workstations for port forwarding to function? |
7 |
What types of applications can be used with port forwarding? |
8 |
What is SSL VPN e-mail proxy? |
9 |
How is the Cisco SSL VPN Client installed on remote access users' workstations? |
10 |
How does the Cisco Secure Desktop assess the location of a remote access user's workstation? |
Part I: Understanding VPN Technology
What Is a Virtual Private Network?
Part II: Site-to-Site VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Advanced MPLS Layer 3 VPN Deployment Considerations
Deploying Site-to-Site IPsec VPNs
Scaling and Optimizing IPsec VPNs
Part III: Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Building SSL Remote Access VPNs (WebVPN)
Part IV: Appendixes
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix B. Answers to Review Questions