Home > Articles > Cisco Certification > CCNP Security / CCSP > CCSP Cisco Secure VPN Exam: Remote Access Configuration

CCSP Cisco Secure VPN Exam: Remote Access Configuration

Chapter Description

This chapter discusses the process of implementing Internet Protocol Security (IPSec) using preshared keys on the Cisco VPN 3000 Series Concentrators. You'll read an overview of remote access using preshared keys, learn how to configure the Cisco VPN 3000 Concentrator Series and browsers for remote access, and discover configuration methods for users and groups. You'll also learn how to set up IPSec Windows clients.

Chapter Glossary

The following terms were introduced in this chapter or have special significance to the topics within this chapter.

cookie A piece of information sent by a web server to a web browser that the browser is expected to save and send back to the web server whenever the browser makes additional requests of the web server.

Extensible Markup Language (XML) A standard maintained by the World Wide Web Consortium (W3C). It defines a syntax that lets you create markup languages to specify information structures.

JavaScript Interpreted programming language from Netscape. Used on websites for such things as pop-up windows and image change during mouse rollover.

Network Time Protocol (NTP) Protocol built on top of TCP that ensures accurate local timekeeping with reference to radio and atomic clocks located on the Internet. This protocol is capable of synchronizing distributed clocks within milliseconds over long time periods.

Remote Authentication Dial-In User Service (RADIUS) Database for authenticating dial-up users and for tracking connection time.

Reverse Route Injection (RRI) Used to populate the routing table of an internal router running OSPF or RIP for remote VPN clients or LAN-to-LAN sessions.

Scalable Encryption Processing (SEP) VPN concentrator modules that perform hardware-based cryptographic functions, including random number generation, hash transforms (MD5 and SHA-1) for authentication, and encryption and decryption (DES and Triple-DES).

Security Dynamics International (SDI) authentication Third-party authentication services using token cards.

Secure Shell (SSH) Sometimes called Secure Socket Shell, a UNIX-based command interface and protocol for gaining access to a remote computer securely.

Secure Sockets Layer (SSL) Encryption technology for the web used to provide secure transactions, such as the transmission of credit card numbers for e-commerce.

Virtual Router Redundancy Protocol (VRRP) In installations of two or more VPN concentrators in a parallel, redundant configuration, VRRP provides automatic switchover to a backup system in case the primary system is out of service, thus ensuring user access to the VPN.

VPN concentrator Any of the Cisco VPN 3000 Series Concentrators.

VPN Manager Cisco VPN 3000 Concentrator Manager.