Datasheet

VPN Planning Design
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Network protocols to be used:
_____EIGRP _____OSPF
Technologies currently in use:
_____Network Address Translation (NAT) _____Packet Filtering (ACLs) _____DHCP _____DNS
Authentication to be used:
_____Digital Certificates _____Shared Secrets _____SSL _____Passwords _____IPsec
Encryption to be used:
_____DES _____3DES _____AES
HASH message method to be used:
_____MD-5 _____SHA-1
Encryption key exchange method to be used:
_____Internet Key Exchange (IKE) _____Manual Exchange
Identify elements of the model that map to IT-related content:
VPN network planning
VPN topology types
Security methods
- Authentication
- Encryption
- HASH message type
- Key exchange type