NAT stands for this.
What is Network Address Translation?
A WAN connects multiple networks over this type of distance.
What is a long geographic distance?
VPN stands for this.
What is Virtual Private Network?
This command displays the routing table.
What is show ip route?
IPsec stands for this.
What is Internet Protocol Security?
This type of NAT allows multiple devices to share one public IP address using port numbers.
What is PAT (Port Address Translation)?
This WAN technology uses a provider’s private cloud to connect enterprise sites.
What is MPLS?
This type of VPN connects two entire networks together.
What is a Site-to-Site VPN?
This command verifies Phase 1 status of an IPsec VPN.
What is show crypto isakmp sa?
This IPsec protocol provides encryption and is more commonly used than AH.
What is ESP (Encapsulating Security Payload)?
These are the three private IPv4 address ranges defined in RFC 1918
What are 10.0.0.0/8, 172.16.0.0–172.31.255.255, and 192.168.0.0/16?
Compared to LANs, WANs typically have higher ______.
What is latency?
This type of VPN allows an individual user to securely connect to a company network.
What is a Remote Access VPN?
This command verifies active IPsec security associations.
What is show crypto ipsec sa?
This IPsec mode encrypts the entire original IP packet.
What is Tunnel Mode?
This term describes a private IP address before it is translated.
What is an Inside Local address?
This is the boundary where the service provider’s responsibility ends.
What is the demarcation point (demarc)?
VPNs create this secure structure over the public internet.
What is an encrypted tunnel?
If NAT is not working, these interface roles must be correctly configured.
What are inside and outside designations?
This protocol is responsible for negotiating keys and security parameters in IPsec.
What is IKE (Internet Key Exchange)?
This command verifies active NAT translations on a Cisco router.
What is show ip nat translations?
This device typically connects a customer LAN to an ISP WAN.
What is a router?
Companies use VPNs as a cost-effective alternative to this dedicated WAN connection.
What is a leased line?
If a VPN tunnel forms but traffic does not pass, this is often misconfigured.
What is the ACL (access control list)?
IPsec provides these three core security services.
What are Confidentiality, Integrity, and Authentication?