O'Reilly logo

CCNP Security VPN 642-648 Official Cert Guide, Second Edition by Howard Hooper

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Configuring Policies, Inheritance, and Attributes

This chapter covers the following subjects:

Policies and Their Relationships: This section reviews the available policies you can apply during a VPN connection and how they work together to form the overall policy applied to a remote user.

Understanding Connection Profiles: This section discusses the role of connection profiles, their configuration elements, and how they are applied to remote users.

Understanding Group Policies: This section discusses the role of group policies for attribute assignment and control of your remote users.

Configure User Attributes: This section reviews the creation of a user account and looks at the available parameters and attributes that you ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required