L2L Connection Examples

Table of contents:


This chapter showed you the basics of setting up ISAKMP/IKE Phase 1 policies and configurations on Cisco PIX and ASA security appliances and on L2L IPsec sessions. As you can see from this chapter, when compared to Chapter 16 and 17 on IOS routers, Cisco security appliances have less capabilities when it comes to features with ISAKMP/IKE Phase 1 connectivity and scalable L2L IPsec sessions.

Next up is Chapter 22, "PIX and ASA Remote Access Connections," where I show you how to set up a PIX/ASA as an Easy VPN Server and a PIX as an Easy VPN Remote.

Part I: VPNs

Overview of VPNs

VPN Technologies




Part II: Concentrators

Concentrator Product Information

Concentrator Remote Access Connections with IPsec

Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN

Concentrator Site-to-Site Connections

Concentrator Management

Verifying and Troubleshooting Concentrator Connections

Part III: Clients

Cisco VPN Software Client

Windows Software Client

3002 Hardware Client

Part IV: IOS Routers

Router Product Information

Router ISAKMP/IKE Phase 1 Connectivity

Router Site-to-Site Connections

Router Remote Access Connections

Troubleshooting Router Connections

Part V: PIX Firewalls

PIX and ASA Product Information

PIX and ASA Site-to-Site Connections

PIX and ASA Remote Access Connections

Troubleshooting PIX and ASA Connections

Part VI: Case Study

Case Study


The Complete Cisco VPN Configuration Guide
The Complete Cisco VPN Configuration Guide
ISBN: 1587052040
EAN: 2147483647
Year: 2006
Pages: 178
Authors: Richard Deal

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net