Speak to our team now +44 (0)1737 821590

Definitive IP VPNs for engineers

A 3 day
HANDS ON
training course

VPN training course description

A hands on course covering IP VPNs from the basics of benefits and Internet vs. Intranet VPNs through to detailed analysis of the technologies involved in IP VPNs. All the major VPN protocols are covered including PPPoE, L2TP, SSL, IPsec and dynamic VPNs. MPLS L3 VPNs are also covered.

Key outcomes from this course

By the end of the course delegates will be able to:
  • Describe what an IP VPN is and explain the difference between different VPN types.
  • Recognise the design and implementation issues involved in implementing an IP VPN.
  • Explain how the various technologies involved in an IP VPN work.
  • Describe and implement: L2TP, IPsec, SSL, MPLS L3 VPNs.
  • Evaluate VPN technologies.

VPN training course details

Who will benefit:
Network personnel.
Prerequisites:
IP Security foundation for engineers.
Duration:
3 days

Training approach

This structured course uses Instructor Led Training to provide the best possible learning experience. Small class sizes ensure students benefit from our engaging and interactive style of teaching with delegates encouraged to ask questions throughout the course. Quizzes follow each major section allowing checking of learning. Hands on sessions are used throughout to allow delegates to consolidate their new skills.

Overall rating:

Customer reviews


"I’ve found it very useful and the course was very well put together and delivered."
D. M. Paradigm
"Will urge others at my work to apply for same course due to the relevant content and way it was moulded to our needs."
S. M. Serco DSN

VPN training course contents

VPN overview
What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages.

VPN Tunnelling
Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, hardware based VPNs, Firewall based VPNs, software based VPNs, tunnelling topologies, tunnelling protocols, which tunnelling protocol should you use? requirements of tunnels.

VPN security components
Critical VPN security requirements, Encryption and authentication, Diffie Hellman, DES, 3DES, AES, PKI, Ca server types, pre shared keys versus certificates, Enrolling with a CA, RADIUS in VPNs.

PPP
Encapsulation, operation, authentication. Hands on: Setting up PPPoE and analysing PPP packets.

L2TP
Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, Layer 2 versus layer 3 tunnelling. Hands on: Implementing a L2TP tunnel.

IPSec
AH, HMAC, ESP, transport and tunnel modes, Security Association, use of encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on: Implementing an IPsec VPN.

SSL VPNs
Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on: Implementing a SSL VPN.

GRE and mGRE
When should GRE be used? Point to point GRE tunnels, Hub and spoke multipoint GRE, NHRP. Encrypting GRE tunnels. Hands on: Implementing a GRE tunnel.

MPLS VPNs
Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on: Implementing a MPLS L3 VPN.

VPN products and services
PE and CPE, management, various VPN products.

VPN issues and architectures
VPN architectures: terminate VPN before/on/after/in parallel with firewall, resilience issues, VRRP, performance issues, QoS and VPNs.

Appendix: PPTP
Why not to use PPTP. Overview, Components, How it works, control and data connections, GRE. Exercise: Building a PPTP VPN.

Why Choose Us

SNT trainers score an average of over 90% on the three main areas of:
  • Ability to teach
  • Technical knowledge
  • Answering questions
“Excellently presented by a very knowledgeable and enthusiastic trainer.” P.D. General Dynamics

We limit our maximum class size to 8 delegates; often we have less than this. This ensures optimal interactivity between delegates and instructor.
"Excellent course. The small class size was a great benefit…" M.B. IBM

We write our own courses; courseware does not just consist of slides and our slides are diagrams not bullet point text. A typical chapter provides clearly defined objectives with a chapter overview, slides with text underneath, a quiz at the end to check the learning of the students. Hands on exercises are at the end and are used to reinforce the theory.

See Dates & Prices for this course

To enquire about this course

To reserve this course online