CCNA_Security_08_bupt

CCNA_Security_08_bupt - CCNA Security Chapter 8...

Info iconThis preview shows pages 1–17. Sign up to view the full content.

View Full Document Right Arrow Icon
1 CCNA Security Chapter 8 Implementing Virtual Private Networks Chapter 8 Implementing Virtual Private Networks
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Lesson Planning This lesson should take 3-4 hours to present The lesson should include lecture, demonstrations, discussions and assessments The lesson can be taught in person or using remote instruction
Background image of page 2
3 Major Concepts Describe the purpose and operation of VPN types Describe the purpose and operation of GRE VPNs Describe the components and operations of IPsec VPNs Configure and verify a site-to-site IPsec VPN with pre-shared key authentication using CLI Configure and verify a site-to-site IPsec VPN with pre-shared key authentication using SDM Configure and verify a Remote Access VPN
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Contents 8.1 VPNs 8.2 GRE VPNs 8.3 IPSec VPN Components and Operation 8.4 Implementing Site-to-Site IPSec VPNs 8.5 Implementing Site-to-Site IPSec VPNs Using SDM 8.6 Implementing A Remote Access VPN
Background image of page 4
5 8.1 VPNs
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 VPNs VPN Overview VPN Technologies VPN Solutions
Background image of page 6
7 VPN Overview What is a VPN? Layer 3 VPNs
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 What is a VPN? Virtual: Information within a private network is transported over a public network. Private: The traffic is encrypted to keep the data confidential. VPN VPN Firewall CSA Regional branch with a VPN enabled Cisco ISR router SOHO with a Cisco DSL Router VPN Mobile Worker with a Cisco VPN Client Business Partner with a Cisco Router Corporate Network WAN Internet
Background image of page 8
9 Layer 3 VPN Generic Routing Encapsulation (GRE) Multiprotocol Label Switching (MPLS) IPSec SOHO with a Cisco DSL Router VPN Internet IPSec IPSec
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 VPN Technologies Types of VPN Networks Site-to-Site VPN Remote-Access VPN VPN Client Software Cisco IOS SSL VPN
Background image of page 10
11 Types of VPN Networks MARS VPN VPN Iron Port Firewall IP S Web Server Email Server DNS CSA CSA CSA CSA CSA Regional branch with a VPN enabled Cisco ISR router SOHO with a Cisco DSL Router VPN Mobile Worker with a Cisco VPN Client Business Partner with a Cisco Router Site-to-Site VPNs Remote-access VPNs Internet WAN
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
12 Site-to-Site VPN MARS VPN VPN Iron Port Firewall IP S Web Server Email Server DNS A CS A CS A CSA CSA CSA CSA Regional branch with a VPN enabled Cisco ISR router SOHO with a Cisco DSL Router VP N Business Partner with a Cisco Router Site-to-Site VPNs Internet WAN Hosts send and receive normal TCP/IP traffic through a VPN gateway
Background image of page 12
13 Remote-Access VPNs MARS VPN Iron Port Firewall IPS Web Server Email Server DNS CSA CSA CSA CSA CSA CSA CSA Mobile Worker with a Cisco VPN Client Remote-access VPNs Internet
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
14 VPN Client Software R1 R1-vpn-cluster.span.com “R1” In a remote-access VPN, each host typically has Cisco VPN Client software
Background image of page 14
15 Cisco IOS SSL VPN Provides remote-access connectivity from any Internet- enabled host Uses a web browser and SSL encryption Delivers two modes of access: Clientless Thin client
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
16 VPN Solutions Cisco VPN Product Family Cisco VPN-Optimized Routers Cisco ASA 5500 Series Adaptive Security Appliances IPSec Clients Hardware Acceleration Modules
Background image of page 16
Image of page 17
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/10/2011 for the course CSIE 992 taught by Professor Lu during the Spring '11 term at National.

Page1 / 139

CCNA_Security_08_bupt - CCNA Security Chapter 8...

This preview shows document pages 1 - 17. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online