O'Reilly logo

CSI Exam Cram™ 2 (Exam 642-541) by Annlee Hines

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Products in the Edge

Terms you'll need to understand:

  • RFC 2827 filtering

  • Unicast RPF

  • NAT

  • PAT

  • overload

  • IKE

  • ISAKMP

  • DH group

Techniques you'll need to master:

  • Configuring VPN termination and NAT on a router

  • Configuring VPN termination and NAT on a PIX

  • Configuring a VPN concentrator from the VMS

  • Configuring a VPN client from the VMS

Because the edge is the part (or parts) of your network that faces the outside world, security here is both more complex and more rigorous. Although most attacks actually come from insiders (at least, according to some statistics), you have a considerable degree of control over what protocols and applications are inside the campus. In the outside world, however, with which your edge modules interconnect, there can be anything ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required