Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Learning Objectives
- Analyze TCP/IP and examine the fields within the IP Header.
- Explain the fields and headers utilized in the ISAKMP Protocol.
- Detail the Main Mode negotiation process for establishing Phase 1 of a VPN.
- Detail the Aggressive Mode negotiation process for establishing Phase 1 of a VPN.
- Detail the Quick Mode negotiation process for establishing Phase 2 of a VPN.
- Compare the features and differences between IKEv1 and IKEv2 protocols.
- Explain symmetric encryption and public/private key encryption mechanisms.
- Describe ISAKMP Security Associations.
- Describe IPSec Security Associations.
- Explain the function of the IPSec AH Protocol.
- Explain the function of the IPSec ESP Protocol.
- Describe and explain the Diffie-Hellman Key Exchange process.
- Define prime numbers and their primitive roots.
- Describe, explain, and configure site-to-site VPNs using Cisco Routers and/or ASA Firewalls.
- Describe Remote Access VPNs utilizing ADSL and Dial-up connections.
- Utilize debug commands in the Cisco CLI and Wireshark to demonstrate and troubleshoot VPN negotiations.
Practical Exercises:
- Lab Exercise 1: Implementing IPSec with manual symmetric encryption keys.
- Lab Exercise 2: Implementing IPSec using IKE and shared secrets.
- Lab Exercise 3: Implementing IPSec using IKE and certificate authentication.
Requirements
A solid understanding of TCP/IP and Cisco IOS is recommended as a prerequisite.
14 Hours
Testimonials (2)
communication, knowledge from experience, solve problems,
Marcin Walewski - Intel Technology Poland Sp. z o.o.
Course - OpenStack Bootcamp
The virtual desktop in a browser feature was kind of neat.