4.1.c Implement and troubleshoot encapsulation

right? it’s confusing…

and vpn… depends on the need or requirement… this like everything else in this journey presents subtle differences that one can miss if asleep at the wheel…

i am not going to reinvent fire…

begin here:

http://www.firewall.cx/networking-topics/protocols/127-ip-security-protocol.html

this is a great site so long as your eyes don’t start bleeding from the color scheme…

part of the difficulty is determining the requirements of the task, and interpreting them correctly because similar things can be accomplished differently… accomplishing the same thing differently leads to FAIL…

http://www.firewall.cx/networking-topics/protocols/870-ipsec-modes.html

and gre:

http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/872-cisco-router-gre-ipsec-tunnel-transport.html