IPSec Virtual Private Network Fundamentals

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [V] [W] [X]

data authentication,

data confidentiality,

     in VPDN deployments

data integrity, 2nd

decryption,

deployment models

     hub-and-spoke VPNs

         clustered spoke design,

         redundant clustered spoke design,

     IPsec+GRE

         sample configurations,

         tunnel establishment, verifying,

     RAVPNs

         clients,

         clustered VPN concentrator designs,

         standalone VPN concentrator designs,

     site-to-site VPNs

         configuring,

         over routed domain,

         verifying configuration,

DES (data encryption standard),

Diffie, Whitfield,

Diffie-Hellman

     key exchange

     secret key generation 2nd

DiffServ, impact of IPsec on,

digital signatures, generating,

distribute lists,

DMVPNs (Dynamic Multipoint VPNs), 2nd

     geographic HA, configuring

DNS server load balancing,

     in RAVPNs with geographic HA

DPD (Dead Peer Detection),

     peer availability

dual-DMZ tunnel termination, 2nd

dynamic crypto maps,

     and RRI

     applying in SOHO environments

     configuring

     impact on ISAKMP/IKE

     impact on VPN behavior

     routing considerations

     security considerations

         key administration and scalability,

         unrestricted peering and traffic flows,

     TED

     verifying

Категории