This chapter discusses how to configure and use the following virtual private networking (VPN) features:
• 13-1: Using Internet Key Exchange (IKE) for VPNs—IKE provides a standardized means for maintaining and exchanging encryption and authentication keys between routers and other IPSec VPN devices. IKE can also integrate with certificate authorities for centralized certificate management.
• 13-2: IPSec VPN Tunnels—IP Security (IPSec) provides a standardized way to secure data transmission over a public or unprotected network. Data can be encrypted with DES, 3DES, or AES, authenticated at the packet level to ensure data integrity, and authenticated to verify the source of the data packets.
• 13-3: High Availability ...