Skip to Main Content
Building Cisco Remote Access Networks
book

Building Cisco Remote Access Networks

by Wayne Lawson
November 2000
Intermediate to advanced content levelIntermediate to advanced
608 pages
16h 50m
English
Syngress
Content preview from Building Cisco Remote Access Networks
118 Chapter 4 • Utilizing VPN Technology for Remote Access Connectivity
Peer The “other side,” or the other router that will be doing encryption. It
takes at least two encryption devices to make a VPN, and each one is the
peer of the other.
Transform-Set Used to define the IPSec protocols you want to use for
authentication and/or encryption.
Crypto Map Used to tie together configurations such as the transform set,
the peer, and the data to be encrypted.
Dynamic Crypto Map A crypto map before some of the information is
provided by the remote peer.
ISAKMP (Internet Security Association and Key Management Protocol)
Framework providing a means for policy negotiations ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cisco OSPF Command and Configuration Handbook

Cisco OSPF Command and Configuration Handbook

Ph.D. - CCIE #2969 William R. Parkhurst

Publisher Resources

ISBN: 9781928994138