1.
|
Describe the features, functions and benefits of Cisco Virtual Private
Network (VPN) products. (I, III)
|
2.
|
Explain Internet Protocol Security (IPSec) and Internet Key Exchange
(IKE) component technologies implemented in Cisco Secure VPN products.
(II)
|
3.
|
Configure Cisco Virtual Private Network (VPN) concentrator for Local
Area Network to Local Area Network (LAN-to-LAN) remote access using
pre-shared keys (IV, VIII, X, XI)
|
4.
|
Configure Cisco Virtual Private Network (VPN) concentrator for local
area network to local area network (LAN-to-LAN) remote access using
digital certificates (V, XII)
|
5.
|
Configure Cisco Virtual Private Network (VPN) concentrator firewall
feature. (VI)
|
6.
|
Configure Cisco Virtual Private Network (VPN) concentrator Windows
Client auto-initiate feature. (VII)
|
7.
|
Install and configure the Cisco IPSec VPN software client. (IX)
|
8.
|
Install and configure the Cisco Virtual Private Network (VPN) Client.
(IX)
|
|