Is WPA Perfect? .................................................................................................... E-16
Product Support for WPA ...................................................................................... E-16
Appendix F
What is a VPN? ..............................................................................................................F-1
IPSec Security Features ..........................................................................................F-2
IPSec Components ..................................................................................................F-2
Mode ..................................................................................................................F-5
Key Management .....................................................................................................F-6
VPN Process Overview ..................................................................................................F-7
Interface Addressing ..........................................................................................F-7
Firewalls ............................................................................................................F-8
Additional Reading .......................................................................................................F-11
Appendix G
Configuration Template .................................................................................................. G-1
Test the VPN Connection .............................................................................................. G-9
xii
201-10301-02, May 2005
Contents