Chapter 7. Implementing IPsec Site-to-Site VPNs

This chapter covers the following topics:

Planning and preparing IPsec site-to-site VPNs

Implementing and verifying IPsec site-to-site VPNs in Cisco IOS routers

Implementing and verifying IPsec site-to-site VPNs in Cisco ASA 5500-X series next-generation firewalls

In the previous chapters, you learned about the benefits of virtual private networks (VPN) and the protocols and methods used to implement those benefits, such as encryption for confidentiality, hashing for data integrity, and authentication for peer verification. You have also seen examples of these protocols, such as Triple Digital Encryption Standard (3DES) and Advanced Encryption Standard (AES) for encryption, message digest 5 algorithm ...

Get Santos:CCNA Sec 210-260 OCG now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.