Course Details

Previous Page


Cisco ROUTE 2.0: VPN Technologies


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
An IP Security (IPsec) VPN uses the Internet to connect branch offices, remote employees, and business partners to the resources of your company, and VPNs are an integral part of any security architecture. Providing confidentiality, integrity, and endpoint authentication, VPNs are ubiquitous and provide data loss prevention mechanisms for data that is in transit at multiple levels. In this course, you will learn about the benefits of VPN implementation and configuration. |n GRE is a tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. By connecting multiprotocol subnet in a single-protocol backbone environment, IP tunneling using GRE enables network expansion across a single-protocol backbone environment. After completing this course you will be able to describe GRE tunneling, as well as how to configure, scale, and verify a GRE tunnel.

Target Audience
Anyone wishing to obtain real-world routing knowledge, and those that are considering CCNP and CCIP certification. This learning path's discussion of routing could also benefit early CCIE Routing and Switching candidates. Students completing the ROUTE 2.0 learning path should have a solid foundation in routing fundamentals, Cisco iOS basics, and Cisco routing basics. Attending the ICND1 and ICND2 classes or having the CCNA certification will fulfill these expectations.

Prerequisites
None

Expected Duration (hours)
1.4

Lesson Objectives

Cisco ROUTE 2.0: VPN Technologies

  • start the course
  • describe IPSec VPNs
  • match the IPSec security service to its function
  • describe the IPSec security protocols
  • describe the function of encapsulating security payload (ESP)
  • describe how IKE is used with IPSec
  • sequence the IPSec phases of operation
  • match the IPSec building blocks to their function
  • sequence the site-to-site IPSec VPN configuration steps
  • describe a GRE tunnel
  • list the tasks required to implement a GRE tunnel
  • explain why a GRE tunnel may flap
  • describe how NHRP can be used to scale GRE tunnels
  • describe how GRE and IPSec work together
  • explain the benefits of using Easy Virtual Networking
  • configure VPN technologies in a given scenario
  • Course Number:
    cc_rout_a20_it_enus