The goal of this course is to learn Virtual Private Network (VPN) fundamental and to overview tunneling techniques used for implementation of VPNs. Free pdf tutorial in PDF in 78 pages designed to beginners students.
Objectives
- Explain VPN concepts and fundamentas
- Define Layer tunneling features
- Configure Tunneling Protocol (PPTP), Virtual Private Dial-up Network (VPDN) and Encryption (MPPE)
Table of contents
- Introduction to IP VPNs
- What is a VPN?
- What are the three main benefits of using a VPN?
- What are the three main VPN deployment scenarios?
- Which different tunneling philosophies can be used in a VPN?
- Cisco's VPN enabled Router family
- Cisco VPDN software solutions
- Entreprise VPN types and applications
- The extranet VPN
- The Intranet VPN
- Tunneling types
- IP Layer 2 Tunneling
- What is an Access VPN?
- What AAA parameters need to be configured for dial-in VP(D)Ns?
- What is a Cisco IOS virtual template interface?
- What is a Cisco IOS virtual profile interface?
- What is a Cisco IOS virtual access interface?
- Point-to-Point Tunneling Protocol (PPTP)
- What protocol is tunneled within PPTP?
- Which Cisco IOS configuration mechanism is used to bind PPTP sessions to virtual interfaces?
- Layer-2 Tunneling Protocol (L2TP)
- What protocol is tunneled within L2TP?
- How does L2TP differ from PPTP?
- Which Cisco IOS configuration mechanism is used to bind L2TP sessions to virtual interfaces?
- How is the AAA functionality distributed between the LAC and the LNS?
- How does the Multichassis Multilink PPP feature use L2TP functionality?
Size : | 664.323 Kb |
Downloads: | 521 |
Created: | 2020-04-05 |
Warning: Trying to access array offset on false in /home/tutovnfz/public_html/amp/article-amp.php on line 263
Others related eBooks about IP Tunneling and VPNs Tutorial
Download free pdf tutorial about Virtual Private Networks, document created by FEUP MPR under Creative commons license. A VPN is a secure tunnel (we can also speak of a virtual link) allowing communication between two entities, including over insecure networks such as the Internet.