Introduction


IPSec configurations can get very complicated, especially if you are dealing with site-to-site IPSec tunnels, remote access IPSec tunnels, and numerous IPSec peers. The key to any IPSec implementation is spending a significant amount of time doing the necessary planning. Identify all the security parameters that will be used for IKE and IPSec and the authentication mechanism that you will use to verify remote IPSec devices. Decide what traffic you need to protect with IPSec by identifying protocols, applications, and IP addresses.

You will also want to verify the configurations on the routers that you will use with IPSec to ensure that their current configurations are compatible with IPSec. Finally, and this point is extremely important, ensure that your network is fully functional before implementing IPSec. Troubleshooting is much more difficult if you do not verify connectivity before you implement IPSec.



CCSP SECUR Exam Cram 2
CCSP SECUR Exam Cram 2 (642-501)
ISBN: B000MU86IQ
EAN: N/A
Year: 2003
Pages: 291
Authors: Raman Sud

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net