Chapter 2. VPN Technologies

Before I can begin discussing VPN implementations such as Internet Protocol Security (IPsec), Layer 2 Tunnel Protocol (L2TP), Point-to-Point Tunneling Protocol (PPTP), and Secure Socket Layer (SSL), you first need an understanding of the technologies that VPNs can use to provide protection for traffic. I’m sure you have already heard of terms such as keys, DES, 3DES, MD5, pre-shared keys, and the like; however, an in-depth understanding of these protocols, algorithms, functions, and processes will help you determine the pros and cons of VPN technologies. Use this information to pick the optimal VPN implementation based on the type of technologies you’ll need to protect your traffic.

I’ve broken this chapter into five ...

Get The Complete Cisco VPN Configuration Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.