Cover image for Building Cisco remote access networks (BCRAN) : CCNP self-study
Building Cisco remote access networks (BCRAN) : CCNP self-study
Certification self-study series
2nd ed.
Publication Information:
Indianapolis, IN : Cisco Press, 2004
Added Corporate Author:


Item Barcode
Call Number
Material Type
30000010105231 TK5105.597 B84 2004 Open Access Book

On Order



An authorized self-study guide based on the CCNP BCRAN 642-821 exam from Cisco Systems, this book presents students with an overview of the technologies and techniques for enabling WAN solutions. It teaches them how to build, configure, and troubleshoot a remote access network to interconnect central sites to branch offices and home offices.

Author Notes

Cisco Systems, Inc., is the worldwide leader in networking for the Internet. Cisco hardware, software, and service offerings are used to create Internet solutions so that individuals, companies, and countries have easy access to information-regardless of differences in time and place.

Table of Contents

Forewordp. xx
Introductionp. xxi
Chapter 1 WAN Technologies and Componentsp. 3
WAN Connection Characteristicsp. 4
Common WAN Connection Typesp. 5
Defining WAN Encapsulation Protocolsp. 12
Determining the WAN Types to Usep. 16
Selecting Cisco Remote Access Solutionsp. 26
Summaryp. 37
Chapter Review Questionsp. 38
Chapter 2 Using AAA to Scale Access Control in an Expanding Networkp. 43
Introduction to Authentication, Authorization, and Accountingp. 43
Security Protocolsp. 45
Cisco Access Control Solutionsp. 46
Understanding and Configuring AAAp. 51
AAA Authentication Commandsp. 53
Summaryp. 68
Chapter Review Questionsp. 69
Chapter 3 Configuring Asynchronous Connections to a Central Site with Modemsp. 73
Modem Connections and Operationp. 73
Using Line Commandsp. 85
Modem Connectionsp. 88
Modem Autoconfigurationp. 96
Verifying and Debugging Modem Autoconfigurationp. 103
Summaryp. 106
Chapter Review Questionsp. 106
Chapter 4 Configuring PPP and Controlling Network Access with PAP and CHAPp. 111
PPP Overviewp. 111
Configuring Basic PPPp. 115
Configuring PPP PAP and PPP CHAP Authenticationp. 121
Using and Configuring Other PPP LCP Optionsp. 128
Multilink PPPp. 140
Verifying and Debugging PPPp. 143
Summaryp. 145
Chapter Review Questionsp. 146
Chapter 5 Using ISDN and DDR Technologies to Enhance Remote Connectivityp. 153
Configuring ISDN BRIp. 153
Configuring DDRp. 167
Configuring ISDN and DDRp. 174
Optional ISDN PPP Featuresp. 181
Summaryp. 193
Chapter Review Questionsp. 194
Chapter 6 Optimizing the Use of DDR Interfacesp. 201
Legacy DDRp. 201
Rotary Groupsp. 203
Dialer Profile Overviewp. 208
Configuring Dialer Profilesp. 214
Verifying and Troubleshooting a Dialer Profile Configurationp. 221
Summaryp. 227
Chapter Review Questionsp. 227
Chapter 7 Establishing a Dedicated Frame Relay Connection and Controlling Traffic Flowp. 231
Frame Relay Reviewp. 232
Configuring Frame Relayp. 236
Verifying Frame Relay Configurationp. 242
Configuring Frame Relay Subinterfacesp. 244
Configuring Frame Relay Traffic Shapingp. 255
Summaryp. 266
Chapter Review Questionsp. 267
Chapter 8 Enabling Backup for a Primary Connectionp. 273
Configuring Dial Backupp. 273
Routing with the Load Backup Featurep. 282
Summaryp. 290
Chapter Review Questionsp. 291
Chapter 9 Managing Network Performance with Queuing and Compressionp. 295
Queuing Overviewp. 296
Configuring Weighted Fair Queuingp. 301
Class-Based Weighted Fair Queuingp. 305
Configuring Low Latency Queuingp. 314
Verifying Queuing Operationp. 316
Configuring Data Compressionp. 324
Summaryp. 325
Chapter Review Questionsp. 326
Chapter 10 Scaling IP Addresses with Network Address Translationp. 331
NAT Operationp. 338
Summaryp. 359
Chapter Review Questionsp. 359
Chapter 11 Using Broadband to Access a Central Sitep. 365
Broadband Overviewp. 365
Cable Technologyp. 370
DSL Technologyp. 380
Configuring the CPE as the PPPoE Clientp. 392
Configuring DSL with PPPoAp. 398
Troubleshooting DSLp. 400
Summaryp. 406
Chapter Review Questionsp. 406
Chapter 12 Virtual Private Networksp. 417
Types of VPNs, Tunnels, and Terminologyp. 417
Cisco IOS Cryptosystemp. 430
IPSec Technologiesp. 436
Preparing for IKE and IPSecp. 445
Configuring IKEp. 456
Configuring IPSecp. 463
Testing and Verifying IPSecp. 475
Summaryp. 481
Chapter Review Questionsp. 482
Appendix A Answers to Chapter Review Questionsp. 493
Glossaryp. 563
Indexp. 575