Virtual private networks (VPN) have become the de facto standard for secure remote access. Countless numbers of telecommuters, suppliers, partners, and mobile workers access corporate network resources using VPN. Connecting remote sites securely over the Internet through a VPN provides a great cost-saving opportunity when compared to traditional WAN access methods such as Frame Relay or ATM. VPNs enable corporations to use the Internet infrastructure provided by Internet service providers (ISP), allowing them to add large amounts of capacity without significant infrastructure enhancements. "IPsec Virtual Private Network Fundamentals" provides you with a basic understanding of how IPsec VPNs operate and also presents an explanation of the different components of Cisco[registered] IPsec implementation. This book covers successful implementation of IPsec in a variety of network environments, from simple site-to-site VPN configurations to comprehensive VPN strategies. Design concepts are presented in each chapter along with configurations and practical case studies. Whether you are looking to extend network security to remote access connectivity or you are simply trying to gain insight into practical IPsec deployment examples on Cisco products, "IPsec Virtual Private Network Fundamentals" will help you to secure your network with Cisco routers and VPN products. James Henry Carmouche, CCIE(R) No. 6085, is a technical marketing engineer on the Cisco Enterprise Systems Engineering team, where he is currently responsible for architecting, constructing, and validating enterprise-class network systems solutions. Understand how VPNs are used in today's networks and explore the drivers for business migration to VPN technology. Differentiate IPsec and Secure Sockets Layer (SSL) VPN from other VPN technologies. Understand the underlying cryptographic technologies that compose an IPsec VPN. Learn basic IPsec VPN configuration techniques. Examine common issues that affect all IPsec designs. Learn principles and solutions for high-availability VPN design. Use public key infrastructure to authenticate IPsec peers through RSA signatures. Learn about IPsec dynamic peering options. This book is part of the "Cisco Press[registered] Fundamentals" series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.