Building a VPN Using IPsec

This chapter covers the following subjects:

• Configuring a Cisco Router for IPsec VPNs Using Preshared Keys

• Configuring Manual IPsec

• Configuring IPsec Using RSA-Encrypted Nonces

Prior to the development of virtual private networking (VPN) technology, the only way to secure communications between two locations was to purchase a "dedicated circuit." To secure communications across an enterprise was tremendously expensive, and securing communications with remote users was cost-prohibitive. VPN technology enables you to secure communications that travel across the public infrastructure such as the Internet. VPN technology allows organizations to interconnect their different locations without having to purchase dedicated connections and significantly reduces the cost of the enterprise network infrastructure.


0 0

Post a comment