2 - 5
Digital Certificates versus Pre-shared Keys
2 - 6
Generic Routing Encapsulation Inside IPSec
2 - 6
IPSec Considerations
2 - 7
Network Address Translation
2 - 8
NAT After IPSec
2 - 8
NAT Before IPSec
2 - 8
Quality of Service
2 - 9
Network Intrusion Detection System
2 - 9
Split Tunneling
2 - 10
Network Resiliency
2 - 10
Headend Failover
2 - 10
GRE
2 - 10
IKE Keepalives
2 - 11
RRI with HSRP
2 - 11
VPN Performance Optimization Considerations
2 - 12
Generic Switching Paths
2 - 12
Fragmentation
2 - 13
IKE Key Lifetimes
2 - 13
IKE Keepalives
2 - 14
Practical VPN Suggestions
2 - 14
Network Management Considerations
2 - 16
Tunnel Endpoint Discovery
2 - 16
IPSec MIB and Third Party Applications
2 - 16
Site-to-Site and Extranet VPN Business Scenarios
3 - 1
Scenario Descriptions
Site-to-Site Scenario
3 - 2
Extranet Scenario
3 - 4
Step 1—Configuring the Tunnel
3 - 6
Configuring a GRE Tunnel
3 - 7
Configuring the Tunnel Interface, Source, and Destination
3 - 8
Verifying the Tunnel Interface, Source, and Destination
3 - 9
Configuring an IPSec Tunnel
3 - 9
Step 2—Configuring Network Address Translation
3 - 10
Configuring Static Inside Source Address Translation
3 - 13
Verifying Static Inside Source Address Translation
3 - 13
Step 3—Configuring Encryption and IPSec
3 - 14
Do'stlaringiz bilan baham: |