O'Reilly logo

Cisco Router Configuration Handbook, Second Edition by Andrew Whitaker, Steve McQuerry - CCIE No. 6108, Dave Hucaby - CCIE No. 4594

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Virtual Private Networks

This chapter discusses how to configure and use the following virtual private networking (VPN) features:

13-1: Using Internet Key Exchange (IKE) for VPNs—IKE provides a standardized means for maintaining and exchanging encryption and authentication keys between routers and other IPSec VPN devices. IKE can also integrate with certificate authorities for centralized certificate management.

13-2: IPSec VPN Tunnels—IP Security (IPSec) provides a standardized way to secure data transmission over a public or unprotected network. Data can be encrypted with DES, 3DES, or AES, authenticated at the packet level to ensure data integrity, and authenticated to verify the source of the data packets.

13-3: High Availability ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required