Table of contents:


This chapter showed you the basics of L2TP and PPTP VPNs. Both have their roots in Microsoft's VPN initiative. PPTP was Microsoft's first VPN implementation, and mostly was an enhanced version of PPP. However, PPTP lacked many security features and thus was combined with the Cisco L2F into L2TP.

Because L2TP doesn't provide for security services such as confidentiality and packet authentication and validation, IPsec is used as a transport. I'll discuss more about how to implement L2TP/IPsec and PPTP remote access VPNs in Chapter 8, "Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN" and Chapter 13, "Windows VPN Client."

Next up is Chapter 5, "SSL VPNs," in which I discuss SSL and its use in implementing VPNs.

Part I: VPNs

Overview of VPNs

VPN Technologies




Part II: Concentrators

Concentrator Product Information

Concentrator Remote Access Connections with IPsec

Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN

Concentrator Site-to-Site Connections

Concentrator Management

Verifying and Troubleshooting Concentrator Connections

Part III: Clients

Cisco VPN Software Client

Windows Software Client

3002 Hardware Client

Part IV: IOS Routers

Router Product Information

Router ISAKMP/IKE Phase 1 Connectivity

Router Site-to-Site Connections

Router Remote Access Connections

Troubleshooting Router Connections

Part V: PIX Firewalls

PIX and ASA Product Information

PIX and ASA Site-to-Site Connections

PIX and ASA Remote Access Connections

Troubleshooting PIX and ASA Connections

Part VI: Case Study

Case Study


The Complete Cisco VPN Configuration Guide
The Complete Cisco VPN Configuration Guide
ISBN: 1587052040
EAN: 2147483647
Year: 2006
Pages: 178
Authors: Richard Deal

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net