larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

CCNP 2: Remote Access Companion Guide (Cisco Networking Academy Program), 2nd Edition

Book

  • Sorry, this book is no longer in print.
Not for Sale
  • Description
  • Sample Content
  • Updates
  • Copyright 2005
  • Edition: 2nd
  • Book
  • ISBN-10: 1-58713-145-5
  • ISBN-13: 978-1-58713-145-5

The only authorized textbook for the Cisco Networking Academy Program.

This book provides the following reference, study, and review tools:

  • Each chapter has a list of objectives referencing the key concepts for focused study.
  • Key terms are highlighted in color throughout the chapter where they are used in context. The definitions are provided in a comprehensive glossary to serve as a study aid.
  • Check Your Understanding review questions, presented at the end of each chapter, act as a review and study guide. They reinforce the concepts introduced in the chapter and help test your understanding before you move on to a new chapter. The answers to the questions are provided in an appendix.

Throughout this book, you see references to the lab activities found in the Cisco Networking Academy Program CCNP 2: Remote Access Lab Companion, Second Edition. Completing these labs gives you hands-on experience so that you can apply theory to practice.

This Cisco authorized textbook is a portable desk reference designed to complement the CCNP 2: Remote Access course in the Cisco Networking Academy Program.

CCNP 2: Remote Access is one of four courses leading to the CCNP certification. CCNP 2 introduces you to the implementation of Cisco routers in WAN applications. The course focuses on selecting and implementing the appropriate Cisco IOS services required to build intranet remote-access links.

Cisco Networking Academy Program CCNP 2: Remote Access Companion Guide, Second Edition, contains all the information from the online curriculum, plus pedagogical aids to help you study. Use this Companion Guide to help prepare for the Building Cisco Remote Access Networks exam (BCRAN 642-821), which is one of the four required exams to obtain the CCNP certification.

You will develop skills with specific WAN technologies including analog dialup, ISDN BRI and PRI, Frame Relay, broadband, and VPN. In addition, the course details important remote-access techniques such as NAT, AAA, and queuing and compression.

With Cisco Networking Academy Program CCNP 2: Remote Access Companion Guide, Second Edition, you have access to the course information anytime, anywhere.

Companion Title:
Cisco Networking Academy Program
CCNP 2: Remote Access Lab Companion Second Edition
ISBN: 1-58713-146-3

Companion CD-ROM
The CD-ROM included with this book provides Interactive Media Activities referred to throughout the book, a test engine of more than 200 questions, and Study Guides for each chapter to enhance your learning experience.

This book is part of the Cisco Networking Academy Program Series from Cisco Press. The products in this series support and complement the Cisco Networking Academy Program.

Table of Contents

Foreword.

Introduction.

1.Wide-Area Networks.

    Remote Access.

      WAN Connection Types.

      Dedicated Connections.

      Circuit-Switched Connections.

      Asynchronous Dialup Connections.

      ISDN Connections.

      Packet-Switched Networks.

      WAN Protocols.

    Selecting Appropriate WAN Technologies.

      Choosing a WAN Connection.

      Identifying Site Requirements and Solutions.

      Central Site Considerations.

      Branch Office Considerations.

      Telecommuter Site Considerations.

    Selecting Cisco Remote-Access Solutions.

      Fixed Interfaces.

      Modular Interfaces.

    Selecting Site-Specific WAN Components.

      Network Overview.

      Central Site Router Equipment.

      Branch Office Router Equipment.

      Telecommuter Site Router Equipment.

    Basic Router Configuration Lab Exercises.

    Summary.

    Key Terms.

    Check Your Understanding.

2.Modems and Asynchronous Dialup Connections

    Modem Functions.

      Digital-to-Analog Conversion.

      Role of the Modem.

      Modem Signaling and Cabling.

      The EIA/TIA-232-C Standard.

        Modem Control Group.

        Data Flow Control Group.

        Data Transfer Group.

      DTE Communication Termination.

      Modem Cabling Components.

      Connecting a Modem to a Router.

        Connecting to the AUX Port.

        Connecting to the Console Port.

        Connecting to a Serial Interface.

      Connecting a Modem to an Access Server—Async Lines.

      Connecting a Modem to a PC.

      Directly Connecting a DTE to Another DTE—Null Modem Cable.

      Modem Modulation Standards.

      Error Control and Data Compression.

    Configuring Asynchronous Interfaces and Terminal Lines.

      Connecting to the Modem—Reverse Telnet.

      Line Types and Numbering.

      Configuring Reverse Telnet.

      Asynchronous Interfaces and Line Configuration.

      Basic Terminal Line Configuration.

      Basic Auxiliary Port Configuration.

      Configuring the Console Port to Use a Modem.

      Configuring a Serial Interface to Use a Modem.

      Configuring Asynchronous Interfaces.

      Asynchronous Interface Configuration Example.

      Introduction to DDR—Dialer List.

    Modem Configuration.

      Modem Configuration Methods.

      Manual Configuration of Modems with Standard Commands.

      Manual Configuration of Modems with Nonstandard Modem Commands.

      Modem Initialization Strings.

      Automatic Configuration of Modems.

      Modem Capability Database.

      Modem Autodiscovery.

      Modem Autoconfiguration.

      Fine-Tuning Modem Autoconfiguration.

      Chat Scripts for Async Lines.

      Configuring Asynchronous Connections Between Remote Routers.

    Verifying Modem Configuration.

      Verifying and Debugging Modem Autoconfiguration.

      Troubleshooting Modem Autoconfiguration.

    Summary.

    Key Terms.

    Check Your Understanding.

3.PPP Overview.

    PPP Overview.

      Point-to-Point Links.

       PPP Architecture.

      Configuring PPP.

      Dialup PPP versus Dialup EXEC Sessions.

        Synchronous PPP Connection.

        Asynchronous PPP Connection.

      Configuring Dedicated PPP Sessions.

      Configuring Interactive PPP Sessions.

      Configuring the Interface Addressing Method for Local Devices.

      Configuring the Interface Addressing Method for Remote Devices.

      PPP LCP Options.

    PPP Authentication.

      PAP and CHAP Authentication.

        PAP Is Not as Secure as CHAP.

      Configuring PAP Authentication.

      Configuring CHAP Authentication.

      Configuring CHAP and PAP Authentication.

    PPP Callback.

      Dialup PPP Callback Overview.

      PPP Callback Operation.

      Configuring the Callback Server.

      Configuring the Callback Client.

    PPP Compression.

      Data Compression.

      Configuring Compression.

      Verifying Compression.

        Uncompressed Bytes.

        Throughput Ratio.

        Buffer Allocation.

        Bytes Transmitted.

        Bytes Received.

        Interpreting the show compress Output.

    PPP Multilink.

      PPP Multilink Overview.

      MLP Operation and Configuration.

      Multilink PPP Example.

    Verifying PPP Configuration.

      Verifying and Troubleshooting PPP.

      PPP Configuration Example.

    Summary.

    Key Terms.

    Check Your Understanding.

4.ISDN and DDR

    ISDN Architecture.

      ISDN versus Asynchronous Dialup.

      ISDN Services and Channelized E1 and T1.

      BRI Call Processing.

      BRI Functional Groups and Reference Points.

      Physical Representation of BRI Reference Points.

      PRI Reference Points.

    ISDN Protocol Layers.

      ISDN Layer 1.

      ISDN Layer 2—Q.921.

      ISDN Layer 3—Q.931.

      ISDN Call Setup.

      ISDN Call Teardown.

    Configuring ISDN BRI.

      ISDN BRI Configuration Overview.

      Configuring the ISDN Switch Type.

      Configuring the SPIDs.

      Configuring the Encapsulation Protocol.

    Configuring Dial-on-Demand Routing (DDR).

      DDR Configuration Overview.

      Defining Interesting Traffic.

      Assigning the Dialer List to an Interface.

      Defining Destination Parameters.

      Defining Optional Call Parameters.

    Static and Default Routing.

      Use of Static and Default Routes.

      Configuring Static Routes.

      Configuring Default Routes.

      Configuring Route Redistribution.

      Deactivating Routing Updates.

      Snapshot Routing.

      Snapshot Routing Model.

      Enabling Snapshot Routing.

      Snapshot Routing Configuration Example.

    Optional Configurations.

      B Channel Aggregation.

      Cisco Proprietary BOD.

      Multilink PPP.

      ISDN Caller Identification.

      Called-Party Number Answering.

      ISDN Rate Adaptation.

      ISDN BRI Configuration Example.

    Monitoring the ISDN Interface.

      The show interface bri Command.

      ISDN show Commands.

      Verifying and Troubleshooting PPP Multilink.

      ISDN debug Command.

    Configuring ISDN PRI.

      PRI Configuration Tasks.

      Selecting the PRI Switch.

      Configuring the T1/E1 Controller for PRI.

      Additional ISDN PRI Configuration Parameters.

      PRI Configuration Example.

      ISDN BRI to PRI Connection Example Using DDR.

    Summary.

    Key Terms.

    Check Your Understanding.

5.Dialer Profiles.

    Legacy DDR.

      Legacy DDR with a Single Destination.

      Legacy DDR with Multiple Destinations.

      Rotary Group Overview.

      Using Rotary Groups.

      Configuring Rotary Groups.

      Configuring ISDN for Rotary Groups.

      Asynchronous Interface Groups.

      Legacy DDR Limitations.

    Dialer Profiles.

      Overview of Dialer Profiles.

      Configuring Dialer Profiles.

      Dialer Pools.

      Placing Calls with Dialer Profiles.

      Receiving Calls with Dialer Profiles.

      Using Dialer Profiles with ISDN B Channels.

      Using Dialer Profiles with ISDN PRI.

      Dialer Map Class.

    Summary.

    Key Terms.

    Check Your Understanding.

6.Frame Relay.

    Frame Relay Concepts.

      Frame Relay Overview.

      Frame Relay Devices.

      Frame Relay Operation.

      Frame Relay DLCIs.

      Frame Relay LMI.

      Inverse ARP.

    Configuring Frame Relay.

      Configuring Frame Relay Encapsulation.

      Configuring Frame Relay Maps.

      Configuring Encapsulation per PVC.

      Verifying Frame Relay Interface Configuration.

      Verifying Frame Relay Operation.

    Frame Relay Topologies.

      Frame Relay Topologies.

      Reachability Issues with Routing Updates.

      Solution for Split Horizon Issue—Subinterfaces.

      Configuring Frame Relay Subinterfaces.

    Summary.

    Key Terms.

    Check Your Understanding.

7.Managing Frame Relay Traffic.

    Frame Relay Traffic Shaping.

      Frame Relay Traffic Shaping Terminology.

      Overview of Frame Relay Traffic Shaping.

      Types of Frame Relay Traffic Management.

      Configuring Traffic Shaping over Frame Relay.

      Traffic Shaping Configuration Steps.

      Traffic Shaping through Rate Enforcement.

      Traffic Shaping through Rate Dynamic Enforcement.

      Traffic Shaping with Queuing.

      Verifying Frame Relay Traffic Shaping.

    On Demand Routing.

      ODR Overview.

      Configuring ODR.

    Summary.

    Key Terms.

    Check Your Understanding.

8.WAN Backup

    Dial Backup.

      Configuring Dial Backup.

      Example of Dial Backup for Link Failure.

      Activating a Dial Backup to Support Primary Line Traffic.

      Example of Dial Backup for Excessive Traffic Load.

    Backup Interface Operations.

      Standby Mode.

      Dialer Profiles as Backup Interfaces.

      Configuring Dial Backups with Dialer Profiles.

    Routing with the Load-Backup Feature.

      Load Backup with OSPF.

      Load Backup with IGRP and EIGRP.

    Verifying Dial Backup Configuration.

      show interface type slot/port Command.

    Floating Static Routes.

      Configuring Floating Static Routes as Backup.

    Dialer Watch.

      Dialer Watch Overview.

      Configuring Dialer Watch.

    Summary.

    Key Terms.

    Check Your Understanding.

9.Managing Network Performance with Queuing and Compression

    Queuing.

      Queuing Overview.

      Effective Use of Traffic Prioritization.

      Establishing a Queuing Policy.

      Choosing a Cisco IOS Queuing Option.     Configuring Weighted Fair Queuing.

      WFQ Overview.

      WFQ Operation.

      Configuring WFQ.

    Class-Based Weighted Fair Queuing.

      Class-Based WFQ Overview.

      CBWFQ versus Flow-Based WFQ.

      CBWFQ and Tail Drops.

      Weighted Random Early Detect.

      Configuring CBWFQ—Step 1.

      Configuring CBWFQ—Step 2.

      Configuring CBWFQ with WRED—Step 2.

      Configuring CBWFQ Default Class—Step 2.

      Configuring CBWFQ—Step 3.

      CBWFQ Queuing Examples.

    Configuring Low-Latency Queuing.

      LLQ.

      Configuring LLQ.

    Verifying Queuing Operation.

      Verifying Queuing Operation Overview.

      Queuing Comparison Summary.

    Optimizing Traffic Flow with Data Compression.

      Implementing Compression Overview.

      Implementing Link Compression over a Point-to-Point Connection.

      Implementing Payload Compression.

      Using TCP/IP Header Compression.

      Implementing MPPC.

      Other Compression Considerations.

    Configuring Data Compression.

    Summary.

    Key Terms.

    Check Your Understanding.

10.Scaling IP Addresses with NAT.

    NAT Overview.

      NAT Topology.

      Private Addressing.

      NAT Terminology.

      NAT Functions.

    Configuring NAT.

      Dynamic NAT.

      Configuring Dynamic NAT.

      Dynamic NAT Configuration Example.

      Static NAT.

      Configuring Static NAT.

      NAT Overload.

      Configuring NAT Overload.

      TCP Load Distribution.

      Configuring TCP Load Distribution.

      TCP Load Distribution Configuration Example.

      Overlapping Networks.

    Verifying NAT Configuration.

      Verifying NAT Translations.

      Troubleshooting NAT Translations.

      Clearing NAT Translations.

    NAT Considerations.

      NAT Advantages.

      NAT Disadvantages.

      Traffic Types Supported by Cisco.

    Summary.

    Key Terms.

    Check Your Understanding.

11.Using AAA to Scale Access Control.

    AAA Overview.

      Introduction to AAA.

      Security Protocols.

      TACACS+.

      RADIUS.

      CiscoSecure Access Control Server.

    Configuring AAA.

      The aaa new-model Command.

      Configuring TACACS+ and RADIUS Clients.

      Configuring AAA Authentication.

      Configuring Login Authentication.

      Enabling Password Protection at the Privileged Level.

      Configuring PPP Authentication Using AAA.

      Configuring AAA Authorization.

      IOS Command Privilege Levels.

      Configuring Command Authorization.

      Configuring AAA Accounting.

    Summary.

    Key Terms.

    Check Your Understanding.

12.Broadband Connections

    Broadband Overview.

      Why Broadband?

      Cable Options.

      DSL Options.

      Satellite Options.

      Wireless Options.

    Cable Technology.

      The Original Cable Plant.

      Data Over Cable.

      Hybrid Fiber-Coaxial (HFC) Architecture.

      Digital Signals over RF Channels.

      Identifying Cable Technology Terms.

      Cable Standards and Organizations.

      RF Signaling Terms.

      Putting Cable Technology All Together.

      Process for Provisioning a Cable Modem.

    DSL Technology.

      What Is DSL?

      Types of DSL.

      DSL Limitations.

      ADSL.

      ADSL and POTS Coexistence.

      ADSL Channels and Encoding.

      Data over ADSL with Bridging.

      Data Over ADSL: PPPoE.

      How Does PPPoE Work?

      Data over ADSL with PPPoA.

    Configuring the CPE as the PPPoE Client.

      Configuration Tasks for DSL.

      Configure PPPoE in a VPDN Group.

      Configuring a PPPoE Client.

      Configure the PPPoE DSL Dialer Interface.

      Configuring PAT.

      PAT for Use with DSL Example.

      Using DHCP to Scale DSL.

      Configuring a Static Default Route.

    Configuring DSL with PPPoA.

      Configuration Tasks for DSL.

      DSL Modulation Configuration.

      Configure the DSL ATM Interface.

      Configure the DSL Dialer Interface.

    Troubleshooting DSL.

      Determining the Layer to Troubleshoot.

      Layer 1 Issues.

        Cisco 827 xDSL Port Pinouts.

      Is the ATM Interface in an Administratively Down State?

      Is the Correct Power Supply Being Used?

      Is the DSL Operating Mode Correct?

      Layer 2 Issues.

      Is Data Being Received from the ISP?

      Is PPP Negotiating Properly?

    Summary.

    Key Terms.

    Check Your Understanding.

13.Virtual Private Networks.

    VPN Overview: Types, Tunnels, and Terms.

      VPN Overview.

      Tunneling and Encryption.

      VPN Usage Scenarios.

      Selecting VPN Technologies.

        Layer 2 Tunneling Protocol (L2TP).

        Cisco Generic Routing Encapsulation (GRE).

        IP Security Protocol (IPSec).

      Identifying VPN and IPSec Terms.

    Cisco IOS Cryptosystem Overview.

      Cryptosystem Overview.

      Symmetric Encryption.

      Asymmetric Encryption.

      Key Exchange—Diffie-Hellman Algorithm.

      Hashing.

    IPSec Technologies.

      IPSec.

        Authentication Header.

        Encapsulating Security Payload.

      Tunnel versus Transport Mode.

      Security Association.

      Five Steps to IPSec.

      How IPSec Uses IKE.

      IKE and IPSec Flowchart.

      Tasks to Configure IPSec.

    Task 1—Prepare for IKE and IPSec.

      Step 1—Determine IKE (IKE Phase 1) Policy.

      IKE Phase 1 Policy Parameters.

        Create IKE Policies for a Purpose.

        Define IKE Policy Parameters.

        IKE Policy Parameters.

      Step 2—Determine IPSec (IKE Phase 2) Policy.

      IPSec Transforms Supported in Cisco IOS Software.

        Authentication Header.

        Encapsulating Security Payload.

      IPSec Policy Example.

      Identify IPSec Peers.

      Step 3—Check Current Configuration.

      Step 4—Ensure the Network Works.

      Step 5—Ensure ACLs Are Compatible with IPSec.

    Task 2—Configure IKE.

      Step 1—Enable IKE.

      Step 2—Create IKE Policies.

      Create IKE Policies with the crypto isakmp Command.

      IKE Policy Negotiation.

      Step 3—Configure ISAKMP Identity.

      Step 4—Configure Preshared Keys.

      Step 5—Verify IKE Configuration.

    Task 3—Configure IPSec.

      Step 1—Configure Transform Set Suites.

      Transform Set Negotiation.

      Step 2—Configure Global IPSec Security Association Lifetimes.

      Purpose of Crypto ACLs.

      Step 3—Create Crypto ACLs Using Extended Access Lists.

      Configure Symmetrical Peer Crypto ACLs.

      Purpose of Crypto Maps.

      Crypto Map Parameters.

      Step 4—Configure IPSec Crypto Maps.

      Example crypto map Commands.

      Step 5—Apply Crypto Maps to Interfaces.

      IPSec Configuration Examples.

    Task 4—Test and Verify IPSec.

      The show crypto isakmp policy Command.

      The show crypto ipsec transform-set Command.

      The show crypto ipsec sa Command.

      The show crypto map Command.

      The clear Commands.

      The debug crypto Commands.

      Crypto System Error Messages for ISAKMP.

    Summary.

    Key Terms.

    Check Your Understanding.

Appendix A: Glossary of Key Terms.

Appendix B: Check Your Understanding Answer Key.

Appendix C: Case Studies.

Index.

Errata

Errata -- 23 KB

Test Engine -- 870 KB (.exe file)

Submit Errata

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.

Overview

Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children

This site is not directed to children under the age of 13.

Marketing

Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out

Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links

This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020