VPN Components
Now that you have a basic understanding of what a VPN is, let’s discuss the components that make up a traditional VPN. Not every VPN implementation will include any or all of these components. Plus, based on the requirements listed in your security policy, you might not need all of these components. Therefore, you need to examine your security policy to determine which VPN implementation (or implementations) has the necessary components to meet your security policy’s requirements.
The following sections will discuss some of the more important components that are typically part of a VPN implementation. Specifically, they will cover the following:
Authentication
Encapsulation Method
Data Encryption
Packet Integrity
Key Management
Non-Repudiation ...
Get The Complete Cisco VPN Configuration Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.