Summary


This chapter was all about IPSec configurations for the IKE Phase 1 tunnel and the IKE Phase 2 tunnel. Before you perform any IPSec configurations, make sure you understand how IPSec works and understand the protocols that are used in the IPSec protocol suite. Then, after learning the IPSec material discussed in the previous chapter, you need to spend most of your time planning the IPSec implementation. Once you document all the IPSec details, test the network to ensure that you have connectivity, and verify that current router configurations are compatible with IPSec. Finally, implement IPSec.



CCSP SECUR Exam Cram 2
CCSP SECUR Exam Cram 2 (642-501)
ISBN: B000MU86IQ
EAN: N/A
Year: 2003
Pages: 291
Authors: Raman Sud

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net