Chapter 7 Flashcards
Implementation Plan
- Deploy broadband connectivity
- Configure static routing
- Document and verify other services
- Implement and tune the IPsec VPN
- Configure GRE tunnels
DSL Variants
ADSL
(Asymmetric DSL) Asymmetric 8 Mbps / 1 Mbps
HDSL
(high bitrate DSL) Symmetric 2 Mbps / 2 Mbps
SDSL
(Symmetric DSL ) Symmetric 2 Mbps / 2 Mbps
SHDSL
(Single-pair high-speed DSL) Symmetric 2.3 Mbps / 2.3 Mbps
VDSL
(Very High bitrate DSL) Symmetric / Asymmetric 52 Mbps / 16 Mbps
The PPP connection is established between the ____ and ___.
The CPE device is configured with a _____ and ____
The core router authenticates the users using either a ____ or an _____ server.
CPE and the core router
username and password.
local database, external RADIUS AAA
Use the __________ command to debug the PPP session authentication.
debug ppp authentication
Verify ATM connectivity using the ____________ command.
debug atm events
Finally, check Layer 1 connectivity and discover the DSL
line status using the____________ command.
show dsl interface atm
Link the source IP addresses to the pool for dynamic address translation.
Router(config)#
ip nat inside source list BRANCH-NAT-ACL pool BRANCH-NAT-POOL
Link a source IP addresses to a pool for static translation.
Router(config)#
ip nat inside source static 192.168.1.254 209.165.200.254
Displays active NAT translations
Displays NAT statistics.
Displays NAT translations as they occur.
show ip nat translations
show ip nat statistics
debug ip nat
Clears all IP NAT translations.
Clears all NAT statistics.
clear ip nat translation *
clear ip nat statistics
Which three protocols are involved in the establishment of an IPsec VPN tunnel?
Encapsulating Security Protocol (protocol 50)
Authentication Header (protocol 51)
Internet Security Association and Key Management Protocol (UDP port 500)
UDP port 4500 (NAT-T)
Steps to Configuring an IPsec VPN
- Configure the initial key (ISAKMP policy) details.
- Configure the IPsec details.
- Configure the crypto ACL.
- Configure the VPN tunnel information.
- Apply the crypto map.
Contains authentication, encryption and the hashing method
commands that are first used to negotiate and exchange credentials
with a VPN peer.
ISAKMP Policy
Identifies an acceptable combination of security protocols, algorithms, and other settings.
IPsec Details
Is an extended IP ACL that identifies the traffic to be protected.
• A permit statement results in the traffic being encrypted, while a deny
statement sends traffic out in clear text.
• Both VPN peers must have reciprocating ACLs.
Crypto ACL