Chapter 1 Outline
Chapter 10: Scale
Cisco IPSec VPNs
Outline:
Chapter
Review
Chapter
Overview
10.1
Dynamic Crypto Maps
10.1.1
Dynamic
crypto map operation
10.1.2
Dynamic
crypto map overview
10.1.3
Dynamic
crypto mapsPIX Firewall
10.1.4
Dynamic
crypto map command examplePIX Firewall
10.1.5
Adding
dynamic crypto map sets into a regular crypto map setPIX Firewall
10.1.6
Dynamic
crypto map examplePIX Firewall
10.1.7
Dynamic
crypto mapsCisco IOS
10.1.8
Dynamic
crypto map command exampleCisco IOS
10.1.9
Adding
dynamic crypto map sets into a regular map setCisco IOS
10.1.10
Dynamic
crypto map exampleCisco IOS
10.2
Configure IPSec Between
Cisco Routers and PIX Firewalls
10.2.1
Network
topology
10.2.2
IKE
policy
10.2.3
IPSec
policy
10.2.4
Example
configuration for router A
10.2.5
Example
configuration for router A (cont.)
10.2.6
Example
crypto map for router A
10.2.7
Example
configuration for PIX 2
10.2.8
Example
configuration for PIX 2 (cont.)
10.3
Configure VPN
Concentrator to PIX Firewall Site-to-Site
10.3.1
Network
topology
10.3.2
IKE Policy
10.3.3
IPSec policy
to PIX 2
10.3.4
Configuration
procedure
10.3.5
Verify IKE
proposals
10.3.6
Verify IKE
proposals | modify
10.3.7
Add IPSec
LAN-to-LAN
10.3.8
Add a new
IPSec LAN-to-LAN connectionIPSec
10.3.9
Add a new
IPSec LAN-to-LAN connectionnetworks
10.3.10
IPSec
LAN-to-LAN done
10.3.11
IPSec
LAN-to-LAN
10.3.12
PIX 2
configuration
10.3.13
PIX Firewall
show crypto map command
10.4
Extended Authentication
10.4.1
Extended
authentication operation
10.4.2
Extended
authentication specify the AAA serverPIX Firewall
10.4.3
Extended
authentication enable XauthPIX Firewall
10.4.4
Extended
authentication examplePIX Firewall
10.5
Wildcard Pre-Shared Keys
10.5.1
Wildcard
pre-shared keys operation
10.5.2
Wildcard
pre-shared keys commandPIX Firewall
10.5.3
Wildcard
pre-shared keys examplePIX Firewall
10.6
IKE Mode Configuration
10.6.1
Mode
configuration overview: address assignment challenge
10.6.2
Mode
configuration overview: the solution
10.6.3
IKE mode
configurationPIX Firewall
10.6.4
Mode
configuration commandsPIX Firewall (cont.)
10.6.5
Mode
configuration commandsPIX Firewall (cont.)
10.6.6
IKE mode
configuration commandsCisco IOS
10.6.7
IKE mode
configuration commandsCisco IOS
10.6.8
IKE mode
configuration commandsCisco IOS
10.7
Tunnel Endpoint Discovery
10.7.1
Dynamic
tunnel endpoint discovery operation
10.7.2
Dynamic
tunnel endpoint discovery operation
10.7.3
Dynamic
tunnel endpoint discovery commandCisco IOS
10.8
Perfect Forward Secrecy
10.8.1
Perfect
forward secrecy (PFS)
10.8.2
Configuring
PFSPIX Firewall
10.8.3
Configuring
PFSCisco IOS
10.9
IPSec with Network Address Translation
10.9.1
Network
address translation
10.9.2
Network
address translation example
10.9.3
NAT and IPSec
10.9.4
Network
address translation with IPSec example
10.10
Configure PIX Firewall for Cisco VPN 3000
Client
10.10.1
Topology
overview
10.10.2
PIX Firewall
to VPN 3000 client pre-shared example
10.10.3
PIX Firewall
to VPN 3000 client pre-shared example (cont.)
10.10.4
VPN 3000
client to PIX Firewall example
10.10.5
VPN 3000
client to PIX Firewall example (cont.)
10.10.6
Summative
configuration exampleCisco secure VPN client
10.11
Configure PIX Firewall for Cisco Secure VPN
1.1 Client
10.11.1
Topology
overview
10.11.2
Summative
configuration examplePIX Firewall
10.11.3
Summative
configuration examplePIX Firewall
10.11.4
Summative
configuration exampleCisco secure VPN client
10.11.5
Summative
configuration exampleCisco secure VPN client (cont.)
10.11.6
Summative
configuration exampleCisco secure VPN client (cont.)
10.12
Configure Cisco IOS for Cisco Secure VPN
1.1 Client
10.12.1
Topology
overview
10.12.2
Summative
configuration exampleCisco IOS
10.12.3
Summative
configuration exampleCisco IOS (cont.)
10.13
Configure Scalable IPSec VPNs
10.13.1
Lab:
Configure Scalable IPSec VPNs
Chapter Summary
Chapter Quiz
Wyszukiwarka
Podobne podstrony:
indexindexindexindexindexindexindexindexindexwięcej podobnych podstron