 | |
| Encryption Basics |
|
 | |
| Symmetrical encryption |
 |
| Asymmetrical encryption |
 |
| Diffie-Hellman |
|
 |
| Integrity Basics |
|
 | |
| Hashing |
 |
| Hashed Method Authentication Code (HMAC) |
 |
| Digital signatures and certificates |
|
 |
| Implementing Digital Certificates |
|
 | |
| Certificate authority support |
 |
| Simple Certificate Enrollment Protocol (SCEP) |
 |
| Microsoft CA server |
 |
| Enroll a device with a CA |
|
 |
| VPN Topologies |
|
 | |
| Site-to-site VPNs |
 |
| Remote access VPNs |
|
 |
| VPN Technologies |
|
 | |
| VPN technology options |
 |
| WebVPN |
 |
| Tunneling protocols |
 |
| Tunnel interfaces |
|
 |
| IPSec |
|
 | |
| Overview |
 |
| Authentication Header (AH) |
 |
| Encapsulating Security Payload (ESP) |
 |
| Tunnel and transport modes |
 |
| Security associations |
 |
| Five steps of IPSec |
 |
| Internet Key Exchange (IKE) |
 |
| IKE and IPSec |
 |
| Cisco VPN solutions |
|
 |