Skip to Main Content
Network Security First-Step, Second Edition
book

Network Security First-Step, Second Edition

by Thomas M. Thomas, Donald Stoddard
December 2011
Beginner content levelBeginner
552 pages
13h 30m
English
Cisco Press
Content preview from Network Security First-Step, Second Edition

Firewall VPN Configuration for Client Access

You can configure Cisco ASA Firewalls to terminate client VPNs, thus allowing users to securely access corporate resources.

Used with IKE, dynamic crypto maps can ease IPsec configuration and are recommended for use in networks where the peers are not always predetermined. You use dynamic crypto maps for VPN clients (such as mobile users) and routers that obtain dynamically assigned IP addresses.

Dynamic crypto maps can be used only to negotiate SAs with remote peers that initiate the connection. They cannot be used to initiate connections to a remote peer. With a dynamic crypto map entry, if outbound traffic matches a permit statement in an access list and the corresponding security association is ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Network Security Auditing

Network Security Auditing

Chris Jackson - CCIE No. 6256
Security and Privacy in Cyber-Physical Systems

Security and Privacy in Cyber-Physical Systems

Houbing Song, Glenn A. Fink, Sabina Jeschke

Publisher Resources

ISBN: 9781587204142Purchase book