IKEv2 IPsec Virtual Private NetworksAuthor :
Paperback
Published : Tuesday 15 November 2016
Description
The IKEv2 protocol significantly improves VPN security, and Ciscos FlexVPN offers a unified paradigm and command line interface for taking full advantage of it. Simple and modular, FlexVPN relies extensively on tunnel interfaces while maximising compatibility with legacy VPNs. Now, two Cisco network security experts offer a complete, easy-tounderstand, and practical introduction to IKEv2, modern IPsec VPNs, and FlexVPN.
The authors explain each key concept, and then guide you through all facets of FlexVPN planning, deployment, migration, configuration, administration, troubleshooting, and optimisation. Youll discover how IKEv2 improves on IKEv1, master key IKEv2 features, and learn how to apply them with Cisco FlexVPN.
IKEv2 IPsec Virtual Private Networks offers practical design examples for many common scenarios, addressing IPv4 and IPv6, servers, clients, NAT, pre-shared keys, resiliency, overhead, and more. If youre a network engineer, architect, security specialist, or VPN administrator, youll find all the knowledge you need to protect your organisation with IKEv2 and FlexVPN.
- Understand IKEv2 improvements: anti-DDoS cookies, configuration payloads, acknowledged responses, and more
- Implement modern secure VPNs with Cisco IOS and IOS-XE
- Plan and deploy IKEv2 in diverse real-world environments
- Configure IKEv2 proposals, policies, profiles, keyrings, and authorisation
- Use advanced IKEv2 features, including SGT transportation and IKEv2 fragmentation
- Understand FlexVPN, its tunnel interface types, and IOS AAA infrastructure
- Implement FlexVPN Server with EAP authentication, pre-shared keys, and digital signatures
- Deploy, configure, and customize FlexVPN clients
- Configure, manage, and troubleshoot the FlexVPN Load Balancer
- Improve FlexVPN resiliency with dynamic tunnel source, backup peers, and backup tunnels
- Monitor IPsec VPNs with AAA, SNMP, and Syslog
- Troubleshoot connectivity, tunnel creation, authentication, authorization, data encapsulation, data encryption, and overlay routing
- Calculate IPsec overhead and fragmentation
- Plan your IKEv2 migration: hardware, VPN technologies, routing, restrictions, capacity, PKI, authentication, availability, and more
You may also like ...
![Product](https://abcbooksimages.s3.eu-west-1.amazonaws.com/sBookimagesFlat2020/9781587144608.jpg)
by
Paperback
15 Nov 2016
Computer security
€56.15
Extended stock – Dispatch 5-7 days
![Product](https://abcbooksimages.s3.eu-west-1.amazonaws.com/sBookimagesFlat2020/9780367881832.jpg)
by
Paperback
12 Dec 2019
Educational strategies and policy
€46.79
Extended stock – Dispatch 5-7 days
![Product](https://abcbooksimages.s3.eu-west-1.amazonaws.com/sBookimagesFlat2020/9780815399353.jpg)
by
Paperback
15 Dec 2017
IT, Internet and electronic resources in libraries
€42.11
Extended stock – Dispatch 5-7 days
![Product](https://abcbooksimages.s3.eu-west-1.amazonaws.com/sBookimagesFlat2020/9780281067923.jpg)
by
Paperback
20 Sep 2012
Christianity
€14.03
Extended stock – Dispatch 5-7 days
Reviews