Home > Articles > Networking > Voice/IP Communications

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Summary

This chapter covered IPSec features and mechanisms that are primarily targeted at the authentication of remote access users. You learned about XAUTH, which provides extended authentication for IPSec telecommuters by using authentication schemes such as RADIUS. MODECFG uses a push model to push attributes to the IPSec client. You also saw how EzVPN greatly simplifies configuration for IPSec clients and allows central configuration of the IPSec policies. You explored the use of digital certificates and PKI, which are becoming increasingly popular for scalable IPSec deployments for both remote access and site-to-site VPNs.

For more information on Security, visit our Security Reference Guide or sign up for our Security Newsletter

  • + Share This
  • 🔖 Save To Your Account