Cisco ROUTE 2.0: VPN Technologies

This course is included in our On-demand training solution.

Overview

An IP Security (IPsec) VPN uses the Internet to connect branch offices, remote employees, and business partners to the resources of your company, and VPNs are an integral part of any security architecture. Providing confidentiality, integrity, and endpoint authentication, VPNs are ubiquitous and provide data loss prevention mechanisms for data that is in transit at multiple levels. In this course, you will learn about the benefits of VPN implementation and configuration.
GRE is a tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. By connecting multiprotocol subnet in a single-protocol backbone environment, IP tunneling using GRE enables network expansion across a single-protocol backbone environment. After completing this course you will be able to describe GRE tunneling, as well as how to configure, scale, and verify a GRE tunnel.

Target Audience

Anyone wishing to obtain real-world routing knowledge, and those that are considering CCNP and CCIP certification. This learning path’s discussion of routing could also benefit early CCIE Routing and Switching candidates. Students completing the ROUTE 2.0 learning path should have a solid foundation in routing fundamentals, Cisco iOS basics, and Cisco routing basics. Attending the ICND1 and ICND2 classes or having the CCNA certification will fulfill these expectations.

Prerequisites

None

Expected Duration

90 min.

Course Objectives

Course Introduction

IPSec VPNs

  • describe IPSec VPNs
  • IPSec Security Services

  • match the IPSec security service to its function
  • IPSec Security Protocols

  • describe the IPSec security protocols
  • Encapsulating Security Payload

  • describe the function of encapsulating security payload (ESP)
  • IKE Communication

  • describe how IKE is used with IPSec
  • IPSec Phases of Operation

  • sequence the IPSec phases of operation
  • IPSec Configuration Building Blocks

  • match the IPSec building blocks to their function
  • Site-to-Site IPSec Configuration

  • sequence the site-to-site IPSec VPN configuration steps
  • GRE Tunnels

  • describe a GRE tunnel
  • Implementing GRE Tunnels

  • list the tasks required to implement a GRE tunnel
  • GRE Tunnel Flapping

  • explain why a GRE tunnel may flap
  • Scaling GRE Tunnels with NHRP

  • describe how NHRP can be used to scale GRE tunnels
  • GRE over IPSec

  • describe how GRE and IPSec work together
  • Easy Virtual Networking

  • explain the benefits of using Easy Virtual Networking
  • Exercise: Configuring VPN Technologies

    COURSE COST



     

    NEED HELP OR NOT SURE?