Chapter 7. Securing Site-to-Site Connectivity
Upon completion of this chapter
What are the benefits of VPN technology?
What are site-to-site and remote-access VPNs?
What is the purpose and benefit of GRE tunnels?
How do you configure a site-to-site GRE tunnel?
What are the characteristics of IPsec?
How is IPsec implemented using the ...