Appendix C

Memory Tables

Chapter 2

Table 2-3 Comparing VPN Options

Network Design

DMVPN (mGRE)

GETVPN (tunnel-less)

SSL VPN (TLS)

FlexVPN (DVTI, IKEv2)

EasyVPN (dynamic Crypto Map/DVTI, IKEv1)

Static IPsec (Crypto Map, SVTI, IPsec/GRE)

Remote access (software client)

 

 

 

 

 

 

Hub-and-spoke only (hardware client)

 

 

 

 

 

 

Hub-and-spoke with spoke-and-spoke

 

 

 

 

 

 

Chapter 3

Table 3-2 Comparison of IKEv1 and IKEv2

Parameter

IKEv1

IKEv2

 

 

One

Exchange messages

Nine for main mode; six for aggressive mode

 

Authentication methods

 

 

Authentication

Both peers use the same authentication

Each peer can use different authentication (for example, one using PSK and the other using RSA-Sig)

Number of combinations ...

Get CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.