Chapter 20. Implementing IPsec Site-to-Site VPNs

In the previous chapters, you learned about the benefits of virtual private networks (VPN) and the protocols and methods used to implement those benefits, such as encryption for confidentiality, hashing for data integrity, and authentication for peer verification. You have also seen examples of these protocols, such as Triple Digital Encryption Standard (3DES) and Advanced Encryption Standard (AES) for encryption, message digest 5 algorithm (MD5) and Secure Hash (SHA) for data integrity, and pre-shared keys (PSK) or RSA signatures (also known as ...

Get CCNA Security 640-554 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.