CCNP BCRAN Remote Access Exam Cram 2 (Exam Cram 640 - XXX)
| With the availability of so many high-speed and affordable WAN connections, it's no wonder that companies large and small have embraced VPN technology. The key to the popularity of VPNs is that they can replace traditionally high-priced dedicated WAN connections for a fraction of the cost. Some of the key advantages of a VPN over a traditional leased line are
VPNs provide three critical functions: confidentiality, integrity, and authentication (CIA):
Some of the VPN technologies are Generic Routing Encapsulation (GRE), Layer 2 Forwarding (L2F), Layer 2 Tunneling Protocol (L2TP), Point-to-Point Tunneling Protocol (PPTP), and IPSec. The types of packets you will be sending dictate what VPN options you will use, such as the level of encryption and whether it is unicast, multicast, or a protocol besides IP. One thing to point out is that neither LT2P nor GRE support data encryption by themselves; you need to combine them with an encryption protocol. IPSec is the focus of this chapter.
Whenever you hear of VPNs, you normally think of a tunnel. A tunnel is a virtual point-to-point connection; it carries one protocol inside of another, takes clear text and encrypts it, then the other end of the tunnel decrypts the data back to cleartext. The encrypted data is known as ciphertext. There are four major VPN topologies:
Types of VPNs
Cisco organizes VPN solutions into two categories:
|