This chapter showed you the basics of setting up L2L sessions on routers. I've focused primarily on the ISAKMP/IKE Phase 2 components for building these connections. The order of the chapter has led you through the features as they became available in the Cisco IOS: static crypto maps, dynamic crypto maps, TED, GRE across IPsec, and DMVPN.
Next up is Chapter 18, "Router Remote Access Connections," where I show you how to configure your router to be an Easy VPN Server or Remote (Client).
Part I: VPNs
Overview of VPNs
VPN Technologies
IPsec
PPTP and L2TP
SSL VPNs
Part II: Concentrators
Concentrator Product Information
Concentrator Remote Access Connections with IPsec
Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
Concentrator Site-to-Site Connections
Concentrator Management
Verifying and Troubleshooting Concentrator Connections
Part III: Clients
Cisco VPN Software Client
Windows Software Client
3002 Hardware Client
Part IV: IOS Routers
Router Product Information
Router ISAKMP/IKE Phase 1 Connectivity
Router Site-to-Site Connections
Router Remote Access Connections
Troubleshooting Router Connections
Part V: PIX Firewalls
PIX and ASA Product Information
PIX and ASA Site-to-Site Connections
PIX and ASA Remote Access Connections
Troubleshooting PIX and ASA Connections
Part VI: Case Study
Case Study
Index