Chapter 13. Virtual Private Networks

This chapter discusses how to configure and use the following virtual private networking (VPN) features:

13-1: Using Internet Key Exchange (IKE) for VPNs—IKE provides a standardized means for maintaining and exchanging encryption and authentication keys between routers and other IPSec VPN devices. IKE can also integrate with certificate authorities for centralized certificate management.

13-2: IPSec VPN Tunnels—IP Security (IPSec) provides a standardized way to secure data transmission over a public or unprotected network. Data can be encrypted with DES, 3DES, or AES, authenticated at the packet level to ensure data integrity, and authenticated to verify the source of the data packets.

13-3: High Availability ...

Get Cisco Router Configuration Handbook, Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.