The last chapter introduced the VPN 3000 concentrators, including a basic overview of their CLI and GUI interfaces. This chapter will focus solely on using a concentrator to terminate remote access sessions. Cisco concentrators support these remote access VPN implementations:
The remainder of this chapter will focus on the configuration of the concentrator to support IPsec remote access VPN implementations, including basic monitoring of connections and controlling remote access connectivity to the concentrator through groups, users, and network access control (NAC). Chapter 8 will discuss the latter VPN implementations on the VPN 3000 concentrators. I'll discuss detailed troubleshooting of VPN connections in Chapter 11, "Verifying and Troubleshooting Concentrator Connections," and the setup of the remote access clients in Part III, "Clients."
Part I: VPNs
Overview of VPNs
VPN Technologies
IPsec
PPTP and L2TP
SSL VPNs
Part II: Concentrators
Concentrator Product Information
Concentrator Remote Access Connections with IPsec
Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
Concentrator Site-to-Site Connections
Concentrator Management
Verifying and Troubleshooting Concentrator Connections
Part III: Clients
Cisco VPN Software Client
Windows Software Client
3002 Hardware Client
Part IV: IOS Routers
Router Product Information
Router ISAKMP/IKE Phase 1 Connectivity
Router Site-to-Site Connections
Router Remote Access Connections
Troubleshooting Router Connections
Part V: PIX Firewalls
PIX and ASA Product Information
PIX and ASA Site-to-Site Connections
PIX and ASA Remote Access Connections
Troubleshooting PIX and ASA Connections
Part VI: Case Study
Case Study
Index